15 years helping South African businesses
choose better software

SIEM Tools

Security information and event management (SIEM) software applies security event management and security information management capabilities to identify potential threats and resolve security incidents. It aggregates and analyzes data from network servers, devices, domain controllers, and more. It also helps users store, normalize, aggregate, and apply analytics to these data to discover trends.

A re-imagined SecOps toolkit equipped with built-in hunting and action capabilities, managed from a single, unified interface. Learn more about Heimdal Threat-hunting & Action Center
The Heimdal Threat-hunting and Action Center brings a re-imagined SecOps toolkit under one roof. It provides security teams with an advanced threat and risk-centric view of their entire IT landscape, offering granular telemetry across endpoints and networks for swift decision-making. Furthermore, the platform is equipped with built-in hunting and action capabilities, which can be easily managed from a single, unified interface straight out of the box. Learn more about Heimdal Threat-hunting & Action Center

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Log360 is a comprehensive SIEM solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. Learn more about ManageEngine Log360
Log360 is a SIEM solution that helps organizations of all sizes combat threats on premises, in the cloud, or in a hybrid environment. You can customize the solution for your unique use cases by using its threat intelligence, event correlation, file integrity monitoring, and user activity monitoring capabilities. You can monitor activities that occur in your Active Directory, network devices, employee workstations, file servers, Microsoft 365, cloud services and more. Learn more about ManageEngine Log360

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
Google Cloud Platform is cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes in all industries. Google Cloud Platform offers a scalable data warehouse powered by cloud storage and machine learning, as well as relational databases for transactions, complex queries, and more. New customers get $300 in free credits during the first 90 days after exhausting free usage which is available across 20+ different products. Learn more about Google Cloud

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Datadog provides an easy-to-use cloud-native SIEM with out-of-the-box security integrations and customizable threat detection rules.
Datadog Security Monitoring, a part of the Datadog Cloud Security Platform, provides robust threat detection for dynamic, cloud-scale environments. With Security Monitoring, you can analyze operational and security logs in real time—regardless of their volume—while utilizing curated, out-of-the-box integrations and rules to detect threats. Developers, security, and operations teams can also leverage detailed observability data to accelerate security investigations in a single, unified platform. Learn more about Datadog

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Ingest data from multicloud/on-premises to detect threats with advanced security analytics, ML & threat intelligence.
Splunk SIEM is a comprehensive security analytics platform that gives businesses the insights needed to stay secure and protected. With data-driven insights, businesses can combat threats, protect data, and mitigate risk at scale with analytics they can act on. The platform breaks down data silos, allowing businesses to ingest data from multicloud and on-premises deployments and gather full visibility to quickly detect malicious threats. Learn more about Splunk Enterprise

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud’s cloud directory enables internal IT departments, MSPs, VARs/distributors, and DevOps teams to securely and easily enable access to any IT resource, from anywhere. Get insight into activity log data for all of JumpCloud’s endpoints and easily ingest it into SIEM tools for auditing and compliance purposes. Track cross-OS system usage, RADIUS network authentications, LDAP access, SAML SSO usage, and changes made by admins to end-user identities and privileges. Learn more about JumpCloud Directory Platform

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
Built on a foundation of free and open, Elasticsearch, Logstash, Kibana, and Beats pave the way for diverse use cases that start with logging and span as far as your imagination takes you. Elastic features like machine learning, security, and reporting compound that value — and since they’re made for Elastic, you'll only find them from us. Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time. Learn more about Elastic Stack

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform. Learn more about Lookout

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Logz.io is the leading open source-based cloud observability platform.
Logz.io is the leading cloud observability platform that enables engineers to use the best open source tools in the market without the complexity of operating, managing, and scaling them. Logz.io offers three products: Log Management built on ELK, Infrastructure Monitoring based on Grafana, and an ELK-based Cloud SIEM. These are offered as fully managed service designed to help engineers monitor, troubleshoot and secure their distributed cloud workloads more effectively. Learn more about Logz.io

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Intelligent solution that monitors your network in order to detect and prioritize threats through machine learning and AI algorithms.
Intelligent solution that monitors your network in order to detect and prioritize threats through machine learning and AI algorithms. Learn more about IBM Security QRadar

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Unlike competitors’ complex, costly setups, Graylog offers both power and affordability, simplifying the IT and security challenges.
Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog provides the edge in Threat Detection & Incident Response across diverse attack surfaces. The company’s unique blend of AI/ML, advanced analytics, and intuitive design makes cybersecurity smarter, not harder. Graylog is also ideal for troubleshooting daily IT performance and availability issues. Learn more about Graylog

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Sematext gives businesses full-stack visibility by exposing logs, metrics, real user & synthetic data and traces through a single Cloud
Sematext Cloud is an all-in-one observability solution for software-based companies that provides key insights into front-end and back-end performance. Sematext encompasses infrastructure, real user & synthetic monitoring, transaction tracing, and log management. Sematext Cloud also offers flexible app-scoped pricing based on plan, volume, and retention selection, where each App can have a different plan, volume, and retention, giving you lots of control over costs with no overage fees. Learn more about Sematext Cloud

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence.
Sumo Logic is a cloud security analytics platform that provides security intelligence for your microservices, hybrid and multi-cloud environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SIEM solution. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Learn more about Sumo Logic

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Enable capabilities such as endpoint protection, SIEM, vulnerability management, threat hunting, and more all within one console.
EventTracker, our flagship managed security platform, is architected to scale with organizations of any size and any stage of maturity. Whether you need a targeted supplement to your existing capabilities and staff or a complete outsourced solution, the EventTracker platform is uniquely customizable to your needs. EventTracker's “snap-in” architecture lets you enable capabilities such as endpoint protection, SIEM, vulnerability management, threat hunting, and more all within one console. Learn more about Netsurion

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Versatile Log & Event Log Hybrid SIEM solution with Active Directory, Health & Inventory monitoring - supports NIST & CMMC.compliance.
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Learn more about EventSentry

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
SIEM tool that monitors logs, detect and prevent breaches with predefined corelations and alerts.
SureLog Security Information and Event Management (SIEM) platform analyzes log event data in real time to detect and prevent security attacks. By consolidating events from all log sources, SureLog correlates and aggregates events into normalized alerts to spot cyber security threats and instantly notifies your IT & security teams. SureLog SIEM is available on premises and in a cloud environments Learn more about Surelog

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Logsign Unified SecOps Platform delivers comprehensive threat detection, investigation, and response (TDIR).
Logsign Unified SecOps Platform delivers comprehensive threat detection, investigation, and response (TDIR) through integrated next-gen SIEM, threat intelligence, UEBA, and SOAR capabilities. Consolidate your security data, gain actionable insights, and automate responses for streamlined defense against threats. The platform seamlessly integrates with your existing security software, leveraging our vast integration library to expand functionality and provide a comprehensive security management experience. Learn more about Logsign Unified SO Platform

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
A log data management solution that centrally records and manages logs of various IT systems with unique log translation technology.
The "ALog series", which has been installed with more than 5,100 contracts in Japan and overseas, is a log data management solution that centrally records and manages logs of various IT systems. With the motto "Make difficult security easy", there are many features that help log utilization, such as unique log translation technology, abundant report templates, and detection of internal fraud by AI. With these technologies, you can realize advanced log utilization without specialized knowledge. Learn more about ALog Series

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Security management platform offering fully integrated security controls for threat detection and compliance management.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Learn more about USM Anywhere

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Unify SIEM, endpoint security, and cloud security Elastic Security modernizes security operations — enabling analytics across years of
Unify SIEM, endpoint security, and cloud security Elastic Security modernizes security operations — enabling analytics across years of data, automating key processes, and bringing native endpoint security to every host. Elastic Security equips teams to prevent, detect, and respond to threats at cloud speed and scale — securing business operations with a unified, open platform. Learn more about Elastic Security

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
User behavior analytics and vulnerability management solution that helps businesses identify internal and external threats.
ArcSight is a security operations and analytics platform that provides holistic security monitoring, threat detection, investigation, and response capabilities. The platform offers real-time correlation, behavioral analytics, and orchestration to help security teams detect threats, streamline investigations, and automate response workflows. Key capabilities include multi-layered analytics, adversary intelligence, log management, MITRE ATT&CK framework integration, and a data lake for collecting and enriching security data. Learn more about ArcSight

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
An easy, effective XDR platform for small and medium businesses, helping them detect and respond to cybersecurity threats.
Blumira’s mission is to help SMBs and mid-market companies detect and respond to cybersecurity threats faster to stop breaches and ransomware. Blumira’s all-in-one SIEM+XDR platform combines logging with automated detection and response for better security outcomes and consolidated security spend. Blumira’s Free SIEM edition allows you to gain visibility into your environment within minutes for up to 3 integrations Learn more about Blumira

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Logpoint's SIEM+SOAR & UEBA platform helps businesses protect their infrastructure from breaches & efficiently respond to cyberattacks
Logpoint is the creator of a reliable, innovative cybersecurity operations platform — empowering organizations to thrive in a world of evolving threats. By combining sophisticated technology and a profound understanding of customer challenges, Logpoint bolsters security teams’ capabilities while helping them combat current and future threats. Logpoint offers SIEM, UEBA, SOAR and SAP security technologies converged into a complete platform that efficiently detects and respond to threats. Learn more about LogPoint

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more.
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more. Learn more about LogRhythm Log Management

Features

  • Log Management
  • Behavioral Analytics
  • Real-Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs