www.gartner.com
Open in
urlscan Pro
99.84.126.68
Public Scan
Submitted URL: http://ec2-54-189-84-127.us-west-2.compute.amazonaws.com/x/d?c=22710981&l=9096b4ec-4805-4912-a647-1fc5b861c75e&r=1d7191bf-8315-48c7-98dd-6e821bf18e98
Effective URL: https://www.gartner.com/doc/reprints?id=1-26OLSQ3G&ct=210630&st=sb
Submission: On June 22 via manual from GB — Scanned from US
Effective URL: https://www.gartner.com/doc/reprints?id=1-26OLSQ3G&ct=210630&st=sb
Submission: On June 22 via manual from GB — Scanned from US
Form analysis
0 forms found in the DOMText Content
Licensed for Distribution Licensed for Distribution This research note is restricted to the personal use of (). MAGIC QUADRANT FOR SECURITY INFORMATION AND EVENT MANAGEMENT Published 29 June 2021 - ID G00467384 - 58 min read By Kelly Kavanagh, Toby Bussa, and 1 more -------------------------------------------------------------------------------- EXPLORE THE INTERACTIVE VERSION Security and risk management leaders increasingly want SIEM solutions with attack detection, investigation, response and compliance capabilities, but must balance this desire with an understanding of the resources needed to run such solutions. This report will help them identify a suitable vendor. THIS MAGIC QUADRANT IS RELATED TO OTHER RESEARCH: Critical Capabilities for Security Information and Event ManagementUpdated 12 April 2022 View All Magic Quadrants and Critical Capabilities MARKET DEFINITION/DESCRIPTION Gartner’s view of the market for security information and event management (SIEM) solutions focuses on transformational technologies and approaches to meeting the future needs of end users. It does not focus on the market as it is today. Gartner defines this market as catering to customers’ need to: * Collect security event logs and telemetry in real time for threat detection and compliance use cases. * Analyze telemetry in real time and over time to detect attacks and other activities of interest. * Investigate incidents to determine their potential severity and impact on a business. * Report on these activities. * Store relevant events and logs. The vendors included in this Magic Quadrant have products designed for this purpose, which they market and sell to the security buying center. SIEM technology aggregates event data produced by security devices, network infrastructure, systems and applications. The primary data source is log data, but SIEM technology can also process other forms of data, such as network telemetry data (flows and packets). Event data can be combined with contextual information about users, assets, threats, and vulnerabilities for the purposes of scoring, prioritization and expediting investigations. The data should ideally be normalized, so that events, data and contextual information from disparate sources can be analyzed more efficiently for specific purposes, such as network security event monitoring, user activity monitoring and compliance reporting. The technology offers real-time analysis of events for security monitoring, advanced analysis of user and entity behaviors, querying and long-range analytics for historical analysis, other support for incident investigation and management, and reporting (for compliance requirements, for example). MAGIC QUADRANT Figure 1: Magic Quadrant for Security Information and Event Management Source: Gartner (June 2021) VENDOR STRENGTHS AND CAUTIONS ELASTIC Elastic is a Niche Player in this Magic Quadrant. Elastic is based in Mountain View, California, U.S., the Netherlands and Singapore. It has customers worldwide. Its SIEM platform is Elastic Security, which offers endpoint security, following Elastic’s acquisition of Endgame in 2019. Its customers include midsize organizations but mainly large enterprises. Elastic’s SIEM platform became generally available in February 2020. Elastic Security can be deployed on-premises or consumed as SaaS via Elastic Cloud. Elastic has a subscription model featuring Standard (formerly Basic) and Premium tiers (Gold, Platinum and Enterprise), available as self-managed software and via Elastic Cloud. The company’s resource-based pricing model is based on the memory resources used to store, search and analyze data. Strengths * Opportunity to start for free and grow into advanced offerings: Elastic has a history of being used for SIEM use cases through the Elasticsearch, Logstash and Kibana (ELK) Stack. Buyers considering Elastic Security can use the free version under the Standard subscription tier, which includes core SIEM functions. Buyers looking for advanced SIEM features and functionality can subscribe to the Gold, Platinum or Enterprise tiers. * Variety of sources for detection content: Elastic provides Elastic Security buyers with its own out-of-the-box detection content, but content is also available from other sources, such as the Elastic user community and SOC Prime. * Support for threat-hunting activities: Elastic’s Kibana Lens feature enables a business intelligence type of approach to threat-hunting use cases. It combines drag-and-drop visualization capability with the native search capabilities of Elastic’s platform. Cautions * Learning curve to understand pricing model: Elastic’s pricing model does not correspond to the market norm of volume-, velocity-, user- or asset-based pricing. A resource-based pricing model may prove complex for some buyers when planning for their initial deployment and future growth. Prospective buyers must ensure they understand the implications of resource-based pricing and how to calculate the required capacity, especially when comparing Elastic’s SIEM solution with competing solutions. * Lack of out-of-the-box compliance support: Elastic’s platform offers no packaged compliance dashboards and reports. Detection rules relevant to compliance are available, but not tagged or easily identified and deployed. Users must rely on community or partner development, or create their own dashboards. * Variable platform management user experience: The user experience is not fully consistent across Elastic’s product when it comes to managing and operating the solution. For example, some functions can be managed only via developer tools within Kibana, while others are managed via a task-specific GUI. EXABEAM Exabeam is a Leader in this Magic Quadrant. Its headquarters are in Foster City, California, U.S., and it has offices worldwide. The majority of its customers are in North America, with the next-largest concentrations being in Europe, Asia/Pacific and Latin America. Most customers are large enterprises, but there are also some midsize clients. Exabeam’s SIEM solution is available on-premises, as SaaS (Exabeam Fusion SIEM [formerly SaaS Cloud]) and for hybrid, federated deployment. It includes Exabeam Data Lake, Advanced Analytics, Threat Hunter, Entity Analytics, Case Manager and Incident Responder. These components can be bundled or acquired separately to augment an existing SIEM product. Add-ons include Exabeam Cloud Connectors and Cloud Archive. Licensing is term-based. Pricing is normally based on the number of users or entities monitored, but there is also optional data volume pricing for SaaS. Strengths * Long-term, searchable log storage: The combination of Exabeam Cloud Archive (for up to 10-year data retention), search across normalized events, anomalies, indicators of compromise, and a timeline of log events with automated enrichment enables hunting and investigation supported by rich context over long time frames. * Modular architecture for tailored deployment: Exabeam’s modular architecture enables customers to select only the capabilities they need for data storage, analytics and response, for example, across multiple hardware, software and cloud form factors. This also enables customers to deploy Exabeam modules to augment a competitor’s SIEM deployment. * Mature and extensive behavioral analytics: Exabeam’s heritage of machine learning (ML)-driven user and entity behavior detections enables it to cover a broad range of use cases. It offers risk scoring and automated context enrichment for users and entities, along with a timeline for investigation and workflow. Cautions * Regional availability of SaaS: Exabeam Fusion SIEM, and the Cloud Archive add-on module, which runs on the Google Cloud Platform, are not available uniformly across all regions. Customers in unsupported regions may, however, be able to run Exabeam software in the cloud using bring your own license (BYOL) options in local cloud infrastructure. * Sigma support: In contrast to several competing SIEM vendors, Exabeam offers limited support for Sigma community content. Although some Sigma-generated detections are included in out-of-the-box correlations, other detections and analytics are unique to Exabeam’s proprietary data models. * Product ecosystem: Exabeam has no add-on products for advanced endpoint or network detection, but relies on integrations with leading third-party products or open-source solutions. Several competing SIEM vendors offer their own technology, in addition to supporting third-party products. FIREEYE FireEye is a Niche Player in this Magic Quadrant. Its headquarters are in Milpitas, California, U.S. Most of its customers are in North America, with the next-largest concentrations being in Europe, the Middle East and Asia. FireEye provides a number of security detection offerings to complement its FireEye Helix extended detection and response (XDR) platform, including network, email, file analysis, packet capture, endpoint, threat intelligence and managed service offerings. FireEye Security Orchestrator provides security orchestration, automation and response (SOAR) capability, for no additional license cost. Helix is a cloud-based SaaS-only SIEM solution, for which pricing is based on events per second (EPS) for data ingestion. Strengths * Ecosystem of threat-centric solutions: FireEye’s ecosystem offers threat-centric solutions for hosts, networks and the cloud that are integrated with, and complementary to, Helix. There is also an option to overlay 24/7 security operations center (SOC) services from Mandiant Managed Defense. This single ecosystem approach will appeal to buyers looking for a single-vendor sourcing option. * Provision of network sensors with Helix: This augments other data and event collection sources with network metadata telemetry for incident investigation and response. * 13-month default data retention period: This is a competitive length, as other cloud SIEM products might offer only 30 or 90 days of default storage. Cautions * SaaS-only delivery: For buyers that require an on-premises option, or that have data sovereignty issues that cannot be addressed by Amazon Web Services (AWS) regions, FireEye Helix may not be a feasible option. * Helix analytics: FireEye lags behind other SIEM vendors in several areas, such as heuristic and behavioral analytics, incident risk scoring, and integration with third-party SOAR solutions. The Helix roadmap indicates plans to address these missing or lacking capabilities, but prospective buyers must monitor the delivery of roadmap items, to ensure FireEye will meet their requirements. * No user modification of analytics: Negating or modifying FireEye analytics can require complex rule creation to achieve the desired outcome. FORTINET Fortinet is a Visionary in this Magic Quadrant. Fortinet is headquartered in Sunnyvale, California, U.S. It has a global footprint and customers in all major world regions, but especially North America and Europe. Its SIEM solution is FortiSIEM. This product includes Advanced Agents (for Windows-based user and entity behavior analytics [UEBA] capabilities). FortiSIEM integrates with FortiSOAR, FortiAnalyzer and other elements of Fortinet’s security product suite. Pricing is based on devices, EPS and number of agents. FortiSIEM is available as a virtual or physical appliance. Perpetual and subscription licenses are available. Strengths * Support for service providers and complex organizations: Fortinet FortiSIEM offers built-in multitenancy support for complex organizations and service providers, as well as a variety of features specific to them. It also offers a consumption-based model for managed security service providers (MSSPs) with unlimited EPS. * Native asset visibility capabilities: Fortinet FortiSIEM has powerful asset discovery capabilities and a built-in configuration management database (CMDB). The CMDB provides centralized visibility of assets discovered via active scanning and passive log inspection. * Integration of FortiSIEM with the wider Fortinet ecosystem: Fortinet offers a diverse ecosystem of security and network products integrated via the Fortinet Security Fabric. Prospective customers and existing Fortinet clients looking for a single vendor to provide them with threat-monitoring, detection and response solutions should consider Fortinet. Cautions * Lack of a cloud-delivered option: FortiSIEM is not available as a SaaS solution. Fortinet relies on partners that offer hosting services for FortiSIEM as a means of delivering a SaaS-like experience to buyers. End users can deploy the solution in their own public or private cloud, or in a hybrid cloud model. * Limited coverage for monitoring cloud environments: FortiSIEM’s cloud security coverage is not as strong as that of other competitors. It lacks support for several public cloud infrastructure and platform services (CIPS), and the only cloud access security broker (CASB) supported is Fortinet’s own FortiCASB product. * User and entity behavior analytics options: UEBA is available in two flavors: a premium offering and a more limited version native to FortiSIEM. Both require agent deployment, and lack capabilities that are available from competitors, such as the ability to create dynamic peer groups. However, Fortinet’s roadmap indicates that these gaps will be addressed. GURUCUL Gurucul is a Visionary in this Magic Quadrant. Gurucul is headquartered in Los Angeles, California, U.S. Its largest concentration of customers is in North America, with the next-largest concentrations being in Europe, Asia, the Middle East and Latin America. Its SIEM solution, Gurucul SIEM, is part of the Gurucul Risk Analytics platform. It is available as SaaS, and for on-premises or hybrid deployment. Components include Log Aggregator, Threat Hunting, Security Data Lake, a Network Traffic Analysis engine, SOAR, as well as Identity Analytics and User & Entity Behavior Analytics. Gurucul offers perpetual and subscription licenses, which can be monthly, annual or multiyear. Pricing is based on the number of users and entities monitored. Strengths * User and identity monitoring capabilities: When the premium Identity Analytics module is licensed, this extends the applicability of Gurucul’s solution from SecOps to identity and access management (IAM) and privileged access management (PAM) teams. * Variety of deployment options: Gurucul offers cloud-based, on-premises and “do it yourself” CIPS options, hybrid (cloud and on-premises) deployment, and integration with a customer’s existing Hadoop-powered data lake. Supported formats include software, containerized, physical appliance, virtual appliance and cloud-based single/shared-tenant. Gurucul supports parent-child deployment options. * Gurucul STUDIO: This component provides a comprehensive analytics builder and rule customization interface for beginners and advanced security analysts alike. Any of the provided data-science-based analytics tools can be customized. Alternatively, users can build their own analytics. Cautions * Potentially confusing modularity: Prospective buyers may struggle to determine what capabilities, features and functionality Gurucul includes in its different packaging options: Unified Security Analytics, SIEM and XDR. For example, although Gurucul’s solution grew out of the UEBA market, the base SIEM license does not include the full range of UEBA capabilities available in the market, to achieve which it requires an add-on module. * Limited support for cloud service providers: Prospective buyers that require cloud deployments in non-Western regions must check whether Gurucul can, or will, support them in monitoring non-Western infrastructure as a service (IaaS) platforms. * Limited visibility for SIEM: Although Gurucul has taken steps to reorient its sales operations and increase its visibility to SIEM buyers, its mind share for SIEM among Gartner clients remains low. HUAWEI Huawei is a Niche Player in this Magic Quadrant. Huawei has headquarters in Shenzhen, China. Its SIEM customers are largely concentrated in China; others are in the Middle East, Africa and Latin America. Its SIEM solution is called HiSec Insight, and there are numerous additional modules and companion technologies for feature- or architecture-specific requirements. Its customer base is split almost evenly between large and midsize enterprises, but there are also some smaller clients. Pricing for on-premises deployments is based on data velocity (EPS) and volume (gigabytes per day), plus log retention and add-on modules. SaaS deployments are based on the number of Elastic Container Services (ECSs) purchased. Strengths * Behavioral analytics: Analytics has been an area of investment by Huawei. Its user behavior analytics provide dynamic peer-group-based detections. Its ML-based risk ranking for entities reflects factors such as asset value, associated rule-based detections and vulnerability data. * Extensive product ecosystem: Huawei offers a number of integrated capabilities, including network detection and response, sandboxing, deception, user behavior analysis, orchestration and response, and threat intelligence. * Flexibility in relation to form factors: Huawei’s product is available in multiple form factors that can be mixed as needed. These include software, physical and virtual appliances. There are also options for hosting on Huawei’s public or private cloud infrastructure. Cautions * Limited support for cloud infrastructure monitoring: Monitoring of cloud infrastructures is limited to Huawei’s own cloud. None of the other cloud services are supported out of the box. * Lack of support for SaaS monitoring: Out-of-the-box monitoring of popular SaaS applications is not provided. Huawei’s platform lacks integrations with Microsoft Office 365, Google Workspace, and applications from Workday, Salesforce and Box. * Limited availability: Huawei’s focus on China, emerging markets in Asia/Pacific, and the Middle East and Africa means its product has little exposure to SIEM buyers elsewhere. Nor does Huawei plan immediate expansion to North America and Europe. IBM IBM is a Leader in this Magic Quadrant. It is based in Armonk, New York, U.S. IBM’s operations focus on North America, Europe, Asia/Pacific, Latin America and the Middle East. IBM Security provides numerous security solutions, in addition to its QRadar SIEM solution, such as Guardium, Trusteer, X-Force Threat Intelligence, Cloud Pak for Security, Verify Access, Privileged Identity Manager, QRadar Network Insights (QNI; for network detection and response [NDR]), WinCollect and QRadar Vulnerability Manager (QVRM; for vulnerability assessment). Licensing is available for server-based, unlimited capacity for on-premises deployments only (perpetual or subscription license). Capacity-based (EPS) licensing is available for on-premises and SaaS deployments (QRadar on Cloud [QROC]). Strengths * Ability to event filter at the collection layer: IBM QRadar can remove undesired data before it is forwarded for correlation and storage. This gives users the ability to fine tune their security-relevant data sources to reduce EPS costs, and use lower-cost native log management for data that is less relevant to security use cases. * Simplified deployment and management of analytics: IBM’s QRadar Use Case Manager (UCM) enables a user to search and filter for any analytic condition, and turn on or off, edit, copy and visualize analytic dependencies. UCM also extends to MITRE ATT&CK coverage and presents required data source types for tactics, techniques and procedures (TTP) detection. * Support for Purdue Model Levels 2 (and above) in operational technology and industrial control system environments: IBM QRadar offers this using the Disconnected Log Collector (DLC) as a data diode that prevents bidirectional access. Flow collectors can monitor network traffic in passive mode. Cautions * Transition of product lines: IBM is in the process of integrating QRadar functionality into its Cloud Pak for Security platform in order to modernize its capabilities and end-user experiences. Big shifts in products are often incremental and may take longer than anticipated to complete. * Lack of native collaboration and chat features: For these, IBM QRadar users have to use third-party solutions or a SOAR add-on. Prospective buyers should check whether their chosen collaboration tools will integrate with QRadar. * Potential for complex contracts: Scoping parameters, deployment models and add-on solutions may result in complex contracts. Pricing can be based on EPS, flows, number of users, number of servers, and number of automated actions, with perpetual and subscription licenses possible in a single proposal. IBM Security customers on Gartner’s Peer Insights platform tend to give IBM lower scores for pricing and contract flexibility than those received by many competitors. LOGPOINT LogPoint is in a Niche Player in this Magic Quadrant. LogPoint is headquartered in Copenhagen, Denmark. It has customers worldwide, but with a concentration in Europe. Its SIEM solution offers UEBA and the LogPoint Director (including Director Console and Director Fabric). Complementary solutions include LogPoint for SAP and Applied Analytics. Licensing is by subscription, with pricing based on the number of assets monitored. UEBA is licensed separately, and priced by number of employees and assets. SIEM form factors include physical appliance and software appliance. UEBA is available only as SaaS. LogPoint acquired agileSI in August 2020 to bolster its SAP security capabilities. Strengths * Marketing and products aligned with specific use cases: LogPoint markets product-specific capabilities, such as SAP security monitoring and Evaluation Assurance Level (EAL) 3+ certification, to relevant organizations (such as those using SAP ERP) and sectors like government and manufacturing. * Support for service providers and complex organizations: LogPoint has native multitenant capabilities. Additionally, the LogPoint Director solution add-on supports central management of multi-instance deployments, which will appeal to service providers and organizations looking for a SIEM solution that can support a parent-child deployment model (for example, those with a headquarters that supports various lines of business). * Native data privacy and protection features: Capabilities such as data masking and obfuscation help address privacy and data protection requirements related to the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Cautions * Footprint outside Europe: Europe is both LogPoint’s home market and its largest market. LogPoint lags behind many competitors in terms of direct sales in other regions. LogPoint indicates, however, that it is addressing this issue by investing in, and maturing, its sales operations, as well as by expanding into other regions to complement the activities of its channel partners. * Limited form factors: LogPoint’s SIEM solution is available only as an appliance (physical or virtual) — there is no SaaS offering. UEBA is delivered as SaaS, but not available on-premises. Buyers looking for a hosted option need to install LogPoint’s solution in their own public or private cloud environment, or use partners that can offer a hosted option. Prospective UEBA buyers should confirm how any data protection and residency requirements can be met. * Basic capabilities for incident management and response: Incident response capabilities, such as case management and support for response actions, are basic. LogPoint lacks a native SOAR option, unlike many competitors, to appeal to buyers that want an integrated SIEM and SOAR solution from the same vendor. LogPoint relies on API integrations with several popular IT service management (ITSM) and SOAR solutions. LOGRHYTHM LogRhythm is a Leader in this Magic Quadrant. Its headquarters are in Boulder, Colorado, U.S. Its SIEM platform includes several add-on components to deliver endpoint, network and user behavior analytics capabilities. A large majority of its SIEM customers are in North America and Europe, with the rest in Asia/Pacific, the Middle East and Africa, and Latin America. Its customer base is skewed toward midsize enterprises and smaller organizations, though large enterprises have also purchased its platform. There is a cloud-hosted deployment option, but most customers deploy its platform on-premises. Licensing is available on a perpetual basis (priced by average number of messages per second per day) or a subscription basis (priced by number of employees). Strengths * Extensive resellers: LogRhythm has a strong team of reseller partners in every major world region. This strength is mirrored by broad support from managed service providers to help modestly resourced buyers manage and monitor its SIEM platform. * Pilot and proof of concept (POC) options: Buyers can take advantage of several types of pilot and POC program, ranging from prepilot workshops to hosted, scenario-based test-drive exercises and “try and buy” options. * Investigation and case management workflow: LogRhythm provides mature and refined investigation and case management capabilities that assemble context and enable users to create an evidence base for case disposition. Cautions * Limited cloud-based options: LogRhythm’s recent acquisitions and product roadmap demonstrate progress in preparing to offer cloud-native SIEM capabilities, but the vendor lags behind many competitors in this regard. Some competitors introduced cloud-based SIEM offerings two years ago, and have since adopted a cloud-first approach for new customers. Recent entrants into the SIEM market are cloud-native providers. * Branding: LogRhythm takes a confusing approach to the naming of its product’s components and capabilities. A more straightforward naming scheme would provide greater clarity to prospective buyers. * Move to the cloud: LogRhythm faces the challenge of developing a new cloud-based platform and introducing its capabilities to buyers, while at the same time maintaining its legacy platform and executing its plans to migrate customers to the new platform. MANAGEENGINE ManageEngine is a Niche Player in this Magic Quadrant. Based in Pleasanton, California, U.S., ManageEngine provides a number of security products, among which Log360 is its SIEM solution. Related solutions (or available modules) include Advanced Behavioral Analytics, Advanced Threat Analytics, Cloud Security Plus and DataSecurity Plus. Log360 is available as SaaS or on-premises, but does not support both in a hybrid model. Licensing is available on an annual subscription or a perpetual basis. Pricing for SaaS deployment is based on the amount of data stored in the cloud over a specific period, whereas on-premises pricing is based on the number of event sources or assets. Strengths * Out-of-the-box incident response playbooks and workflows: ManageEngine’s Log360 solution provides many of these, with features that allow for custom content creation. For organizations with an existing incident or case management system, Log360 integrates with popular ticketing and incident management platforms. * Reporting engine: ManageEngine’s reporting engine is comprehensive, with support for numerous compliance-framework-focused outputs and alerting based on compliance violations. * Product support: Reviewers on Gartner’s Peer Insights platform have praised ManageEngine’s support for the Log360 product. Cautions * Use-case support: There is a noticeable lack of support in ManageEngine’s Log360 solution for, among other things, cloud services, applications and operational technology, industrial control systems, and Internet of Things (IoT) asset monitoring. * Support for third-party solutions: Third-party collaboration products, external SOAR, UEBA, endpoint security and NDR technologies are notably absent from the list of technologies supported by ManageEngine Log360. * Limited deployment options: ManageEngine Log360 supports either on-premises or cloud deployment in its Zoho cloud environment, not a hybrid mix. MCAFEE McAfee is a Niche Player in this Magic Quadrant. McAfee is headquartered in San Jose, California, U.S. Its customer base spans the world, but most of its clients are in North America. McAfee’s Enterprise Security Manager (ESM) includes several components for logging and analytics. McAfee also has a large ecosystem of other security solutions that integrate with ESM, including Application Data Monitor, MVISION Cloud and MVISION EDR. There are perpetual licenses for physical or virtual appliances, and pricing is based on the appliance size (measured in cores) that can support a defined amount of data (measured in EPS). McAfee ESM Cloud, introduced in July 2020, is available on an annual subscription, priced by expected EPS. Strengths * Hosted cloud offering: McAfee ESM Cloud was released in 2020 to offer buyers another deployment option. It is a hosted version of ESM that uses Oracle Cloud, which has good coverage of most regions, including the Middle East. * Support for compliance use cases and requirements: Buyers that need coverage for a range of compliance regulations and standards around the world will be well supported by McAfee ESM. * Ability to consolidate SIEM and other solutions: Buyers who want a SIEM product and to standardize on a single vendor’s product ecosystem should consider McAfee. It offers a range of complementary solutions, such as an endpoint detection and response (EDR) solution, a CASB, an intrusion prevention system and a secure web gateway. Cautions * Limited advanced features and add-ons: McAfee lags behind competing SIEM vendors that offer cloud-native SIEM options, ML-powered UEBA and SOAR add-on solutions. * Requirement for add-ons for a range of cloud environments: Native monitoring of popular SaaS solutions and CIPS by McAfee ESM is limited to Microsoft Office 365, AWS and Microsoft Azure. Other SaaS apps and CIPS require use of MVISION Cloud or an integration with a third-party CASB. * Potential impact from sale of enterprise business: In March 2021, McAfee announced the sale of its enterprise business to Symphony Technology Group. This sale may introduce uncertainty for existing customers and potential buyers. Those considering McAfee for SIEM should check its roadmap and future support for McAfee ESM. MICRO FOCUS Micro Focus is a Niche Player in this Magic Quadrant. It is headquartered in Newbury, U.K., and has offices and customers across the world. Its ArcSight SIEM platform consists of several components for event collection/logging, alerting, investigation, analytics and response. ArcSight customers are mostly large enterprises, with the remainder split evenly between small and midsize organizations. Customers are relatively evenly distributed across North America, Europe and Asia/Pacific, with smaller numbers in the Middle East and Africa and Latin America. Licensing is primarily perpetual. Pricing is based on EPS. ArcSight Intelligence (UEBA) is available on a subscription basis, priced by number of users. Additional subscription options are planned. Strengths * Modernization: Micro Focus has reworked and modernized several components of its ArcSight architecture to support greater scalability and performance for data ingestion and management, improved reporting and a better UI. There is a roadmap for additional modernization. * UEBA and SOAR: Micro Focus has improved ArcSight’s integration with the Interset UEBA technology it acquired in 2019. In 2020, it acquired SOAR capability, which is already integrated into the platform. * MITRE ATT&CK mapping: Micro Focus’ platform offers extensive mapping of detection content to the MITRE ATT&CK framework. Cautions * Lack of consistency in deployment options: Work on Micro Focus’ ArcSight architecture is in progress, and this may complicate selection, deployment and management of its solution. Although components are available as software images, support for deployment in other formats differs. Some components are available as physical appliances. Some are available in a containerized framework. Some are available with support for cloud-native services in select clouds. * Limited cloud and SaaS coverage: Micro Focus’ out-of-the-box monitoring capabilities for SaaS and cloud infrastructure are more limited than those of many competitors. Although Microsoft Office 365 applications are supported, several other popular SaaS business applications, including those of Salesforce and Workday, require connector customization. AWS CloudTrail and other services are supported, as are several Microsoft Azure services, but other cloud platforms require connector customization. * POC and pilot support: Micro Focus has no formalized and generally available POC or pilot program. POC requests are addressed on a case-by-case basis, with the exception that CrowdStrike customers can request a POC for the SaaS UEBA capability via the CrowdStrike market. By contrast, several SIEM competitors have extensive and easy-to-access POC and pilot programs. MICROSOFT Microsoft is a Visionary in this Magic Quadrant. Based in Redmond, Washington, U.S., Microsoft has a global base of customers. Its SIEM product, Azure Sentinel, became generally available in September 2019. It is delivered only as SaaS via Microsoft’s Azure cloud services. Azure Sentinel is available in all Azure regions except China. Licensing is via subscription. Pricing is primarily based on the volume of data ingested, via reserved capacity or pay as you go. Use of services for extra data storage, automation and “build your own machine learning” incurs additional cost. Microsoft has a large ecosystem of security solutions, such as endpoint protection platforms, EDR solutions and CASBs, that integrate with Azure Sentinel. Strengths * Cloud-native SIEM product: Since Azure Sentinel is cloud-native and built in Azure, it scales up and down elastically, as needed, to support users. Buyers do not have to worry about managing capacity, and license changes are not applicable, particularly with the pay-as-you-go option. Users can change their license model monthly. The pricing model aligns with a true SaaS approach, whereby customers can consume as in a pay-as-you-go model or buy a set amount of reserved capacity. * Breadth and scope of product portfolio: Microsoft offers a rich ecosystem of security and other IT solutions (Microsoft 365 Defender, Azure Defender, Office 365 and Azure) that are natively integrated with Azure Sentinel. This will appeal to customers who have invested in these Microsoft solutions. * Integration capabilities: Azure Sentinel has a robust API interface that allows for flexible interfaces, based on a user’s needs and requirements. This will appeal to organizations that want to interface with Azure Sentinel using different methods, not just via the Azure Sentinel workspace interface (like MSSPs). Cautions * Lack of SIEM functionality in some areas: Azure Sentinel customers will find that functions that are native to many vendors’ SIEM offerings, such as connectivity to ITSM solutions, require the use of Azure Logic Apps, another piece of the Azure ecosystem. Additionally, out-of-the-box compliance reporting for common requirements and standards is limited. Azure Security Center provides coverage for CIPS-related compliance with ISO 27001, PCI Data Security Standard (DSS) and Azure CIS. Watchlists are a preview feature at the time of writing. * Need for familiarity with Azure ecosystem: Users need some familiarity with the Azure ecosystem, as Azure Sentinel is an app that runs within Azure and relies on other Azure services to complement it (such as Log Analytics and Logic Apps). It is also important to understand how the different components of Azure Sentinel are priced and to manage their consumption, especially in a pay-as-you-go model. * Suitability of SaaS model for some buyers: Some customers may be unable to take advantage of Azure Sentinel — for example, those seeking an on-premises solution because they have data residency requirements, or those that want a traditional licensing model (based, for example, on operational expenditure on a perpetual basis with maintenance included). It might actually be possible to fulfill data residency requirements with Azure Sentinel, but prospective customers need to examine the currently available Azure regions and investigate those that are planned. NETWITNESS NetWitness, an RSA business, is a Niche Player in this Magic Quadrant. NetWitness is headquartered in Bedford, Massachusetts, U.S. It has a global customer base of mostly large enterprises. The NetWitness Platform (NWP) includes NetWitness Logs, Network, Endpoint, IoT, UEBA and SOAR. Perpetual and term licenses are offered. Pricing of components is based on data volume (Logs and Network), number of endpoints (Endpoint), active accounts (UEBA), and users and playbooks (SOAR). During the past 12 months, NetWitness was sold and spun out of Dell Technologies as a stand-alone business within RSA. Strengths * Support for security operations centers (SOCs) wanting a single-vendor ecosystem: NetWitness’ NWP is a comprehensive platform that will appeal to SOCs that want a single vendor for modern SOC instrumentation, including integrated SIEM, UEBA, SOAR, EDR, network threat analytics (NTA, including packet capture), and IoT monitoring technologies. * Hybrid deployment options: For organizations looking for an on-premises or hybrid model with their private clouds or public CIPS, the NWP is highly flexible in terms of where and how components can be deployed. Licensing of NetWitness Logs is based on data consumption, not product components (such as decoders, log collectors, concentrators and brokers), so as many components as are required can be utilized without increasing the license cost. * Support options: NetWitness offers a variety of training options through the RSA University — remote, self-paced and in-person. An on-demand subscription is also available for access to training when needed. Cautions * Limited SaaS option: NetWitness’ options for cloud SIEM are limited to Orchestrator (SOAR), IoT monitoring and the Detect AI product. Buyers have to handle their own deployments of other NetWitness components in their own private clouds or CIPS. Alternatively, they can choose a partner from the NetWitness ecosystem to provide a cloud option. NetWitness indicates that a hosted option is a near-term roadmap item. * Complexity: NetWitness Logs and Network can be complex, depending on the architectural requirements, and may therefore prove challenging for organizations that are less mature and lacking resources. Buyers considering NWP should consider drawing on NetWitness’ partner ecosystem for deployment and ongoing operational management support. * Cloud service monitoring: NWP’s support for CASB solutions is limited to Netskope and Proofpoint. Some popular SaaS apps, like those of Workday and Box, do not have native API integration support. CIPS like AWS, Azure and Google Cloud are supported, however. Other cloud services — from IBM and Oracle, among others — are supported, but not via API integrations. Nonintegrated SaaS and CIPS require the Universal Rest API Plugin, NetWitness’ Log Collector or Log Decoder, a Python-based plug-in or a Logstash instance. ODYSSEY Odyssey is a Niche Player in this Magic Quadrant. Odyssey is based in Cyprus, and its operations are heavily focused on Europe and the Middle East. Odyssey provides a number of security solutions, including EDR and security services. Its SIEM product is ClearSkies SaaS NG SIEM. Related solutions (or available modules) include the Identity and Access Service module, ClearSkies NG Endpoint Detection & Response (EDR), and ClearSkies NG Active Defense. ClearSkies is available as SaaS only, and the licensing model is subscription-based. Pricing is based on data volume (gigabytes) per day. Strengths * Simplicity of product licensing: Odyssey’s SIEM product is licensed by volume (gigabytes per day) as a subscription, which is simple. Options for three-, six- and 12-month licenses are available. Each period offers a fixed amount of data, an analysis window (in weeks), support for a certain number of users and storage. Additional options are available in the same subscription windows and are priced accordingly (for example, per EDR agent, portal user, deception decoy or beacon trap). * Potential for integration with EDR solution: Odyssey has its own EDR solution, which can be integrated with its ClearSkies SIEM solution. * Optional deception add-on: Odyssey offers Active Defense as an optional deception add-on, which is unusual in the SIEM sector. Cautions * Concentration on southern Europe and the Middle East and Africa: Odyssey has only a very small number of clients in the Americas and Asia/Pacific. * Lack of some modern SIEM capabilities: Odyssey is lacking in capabilities such as incident response, integration with service desk tools (although ServiceNow is supported), and support for common SaaS solutions and CIPS. * Extremely limited support for cloud services and application monitoring: Odyssey supports only the Microsoft Graph API and Office 365 Management Activity API for monitoring Office 365, and deployment is limited to its own private cloud and Sahara Net. RAPID7 Rapid7 is a Leader in this Magic Quadrant. Rapid7 is headquartered in Boston, Massachusetts, U.S. Its SIEM solution, InsightIDR, runs on the cloud-based Insight platform. Other products available include InsightVM (vulnerability management), InsightAppSec, InsightConnect (SOAR), DivvyCloud (cloud security posture management) and Enhanced Network Traffic Analysis. Customers of the InsightIDR platform are concentrated most heavily in the U.S., followed by Europe and Latin America. InsightIDR is offered on a term license, with a straightforward pricing model based on the number of assets monitored. Strengths * One platform with multiple security products: Rapid7’s core SIEM platform offers logging and threat detection, including UEBA, via endpoint agents, and deception technology, along with incident management and reporting. Optional add-ons from Rapid7 offer vulnerability management, network monitoring, orchestration and response, and cloud security posture management. * Curated experience for modestly resourced customers: Rapid7 manages detection content and threat intelligence feeds on the Insight platform, thus minimizing the need for customers to do so. * Managed detection and response service: This is available from Rapid7, at additional cost. It represents a single source for customers that want access to the SIEM product and need service support for monitoring and investigation. Cautions * Compliance: Rapid7’s out-of-the-box support for regulatory compliance reporting formats is limited to PCI DSS and the U.S. Health Insurance Portability and Accountability Act (HIPAA). Customers with other requirements need to create dashboards and reports. * Geographic availability: InsightIDR is hosted on AWS. Buyers who need their data to reside in specific geographies should confirm that Rapid7 enables this. At the time of writing, InsightIDR is not available in South America or the Middle East. * Customization: Buyers with requirements for extensive development of detections and analytics specific to their environments and use cases should carefully assess whether Rapid7’s out-of-the-box content and rule customization facilities meet their needs. SECURONIX Securonix is a Leader in this Magic Quadrant. Securonix is headquartered in Addison, Texas, U.S., and has offices elsewhere in the U.S., the U.K., Singapore and India. Its SIEM solution includes Next-Gen SIEM, Security Data Lake, UEBA, SOAR, NDR, threat intelligence, adversary behavior analytics and several use-case specific apps (such as for healthcare and SAP). Most Securonix customers are in North America, followed by Europe, Asia/Pacific, the Middle East and Africa, and Latin America. Customers are mostly large enterprises, but there are also some midsize customers. Smaller customers are served by managed service partners. Most buyers opt for term licenses, but perpetual licenses are available. Strengths * Data privacy controls: Securonix provides extensive controls to support data privacy, including granular role-based access control, extensive data masking flexibility and a workflow for unmasking. * Managed service partner support: Securonix has secured partnerships with numerous large managed service partners over the past 18 months. These enable midsize and smaller organizations to use its product with the support of expert services. * Threat intelligence support: Securonix provides extensive threat intelligence platform (TIP) capabilities natively. It also provides out-of-the-box integrations with a broad range of third-party TIP products. Cautions * Platform management on-premises: End-user customers using Securonix SIEM solution on-premises have reported that deploying and managing it have proved complex and challenging undertakings. They recommend seeking training and assistance from professional services. * Product support: Users have reported lower levels of satisfaction in several product support areas than is the case for many of Securonix’s competitors for on-premises deployments. Securonix has hired senior leaders in engineering, customer success and operations to drive service improvement. * On-premises scalability: Prospective buyers should check Securonix’s ability to meet workload requirements for large-scale on-premises deployments. SPLUNK Splunk is a Leader in this Magic Quadrant. Headquartered in San Francisco, California, U.S., Splunk has a global but U.S.-centric customer base. Splunk SIEM includes the core product, Splunk Enterprise, and Splunk Cloud, Enterprise Security and Mission Control. Premium, but not natively integrated, offerings exist for UEBA and SOAR. Splunk’s offering can be deployed as software or via Splunk Cloud. Splunk Enterprise and Enterprise Security are licensed on subscription, with pricing models that include volume ingested per day, infrastructure/workload, tiered pricing and enterprise license agreements. In October 2020, Splunk released Mission Control as a SaaS-based solution for central visibility of Splunk Enterprise Security, User Behavior Analytics (UBA) and Phantom. Strengths * Support for buyers wanting core SOC tools to support existing technology investments: Splunk’s approach will appeal to buyers who want a core platform that provides SIEM, UEBA and SOAR solutions, along with integration with a variety of third-party technologies. Splunk is flexible for buyers who require out-of-the-box integrations and support, which Splunk provides via its Splunkbase apps, APIs, Mission Control Plug-in Frameworks, and Phantom integrations. * New pricing models to address different usage patterns: Splunk has expanded its license models over the past several years to offer buyers options beyond data-ingestion-based pricing. New options include workload-based pricing (using virtual CPUs on-premises and virtual compute units for Splunk Cloud), in addition to tiered pricing models available to non-public-sector buyers (Predictable Pricing). Buyers now have different options available, the better to align their Splunk usage with different pricing models. * Visibility with buyers: Splunk maintains a high level of visibility to SIEM buyers in North America and Europe. It is less visible to buyers in Asia/Pacific, Latin America and the Middle East. Cautions * Price and contract flexibility: Feedback from Gartner clients indicates concerns about the cost of Splunk. Reviewers on Gartner’s Peer Insights platform have tended to give Splunk lower scores for pricing and contract flexibility than those received by many competitors. * Lack of fully cloud-native security operations suite: Splunk Enterprise Security is offered in Splunk Cloud, but buyers wanting an entirely cloud-delivered option that includes Splunk UBA and Phantom must deploy those solutions in their own CIPS, or ask Splunk whether hosted options are available in their geographies. Mission Control can help minimize the impact by providing a single UI for all three solutions, regardless of where they are deployed. * Geographic support for Splunk Cloud: Buyers in North America, Europe and Asia/Pacific are supported by appropriate points of presence for Splunk Cloud. But buyers in the Middle East, Africa and Latin America will need to check whether they can be supported, if they have concerns about, or requirements for, data residency. SUMO LOGIC Sumo Logic is a Visionary in this Magic Quadrant. Headquartered in Redwood City, California, U.S., Sumo Logic also has offices in Europe (including the U.K.) and Asia/Pacific. Most of Sumo Logic’s SIEM customers are in North America, with the next-largest concentrations being in Asia/Pacific and Europe. Its SIEM product is called Cloud SIEM Enterprise, which is available only as an AWS-based SaaS offering. Licensing is subscription-based (with pricing based on data ingestion) or credit-based (with credits being used to enable specific resource usage, such as for occasional search or continuous analytics), with tiering options. Strengths * Pricing model flexibility: Sumo Logic offers a pricing model with three elements: credit-based pricing, data tiering and solution packaging. This gives customers the flexibility to select the pricing scheme that best matches their planned data ingestion and investigation workloads, independent of the event rate and numbers of data sources or users. * Cross-customer visibility and insights: Sumo Logic’s multitenant architecture enables anonymized analytics across the customer base to improve the tuning of detections and workflows. Some of these capabilities may not be immediately visible to buyers, but can result in improved performance of the solution over time. Other user-facing solutions provide threat analytics and recommendations based on cross-customer analysis of specific data sources and threat feeds. * Robust event filtering, masking and routing: Sumo Logic’s event collector supports extensive filtering to manage ingestion, masking and hashing in order to help meet data privacy needs. It also supports flexible routing and bandwidth management for low-bandwidth environments. Cautions * Analytics coverage: Sumo Logic’s out-of-the-box security detection capabilities are not as extensive as those available in other vendors’ SIEM products. Advanced analytics for user behavior are not as mature as those of several SIEM competitors. * Resource estimation: Sumo Logic’s credit-based model may challenge buyers who lack experience with estimating the ingestion volume and investigation resources needed to meet their requirements. Buyers should establish processes to monitor credit usage and budgets to avoid license capacity issues. * Uneven support for integrations: Although users can install and run most apps from Sumo Logic’s application library, an app for PCI compliance and another for security analytics require enterprise licensing and a paid professional services contract to install and configure. VENUSTECH Venustech is a Niche Player in this Magic Quadrant. Venustech is based in Beijing, China. Most of its customers are in Asia/Pacific, with smaller numbers in the Middle East and Africa. Its SIEM product is Venusense Unified Security Management. Related solutions (or available modules) include Cybersecurity Situation Awareness, Security Analytics, NTA, Configuration Verification, Business Supporting Security Management, and Asset Exploration and Management. The SIEM product is available as SaaS and on-premises. Licensing is perpetual or subscription-based, with special licensing for MSSPs and for organizations in the education sector. Pricing is based on the number of log sources, but pricing by number of employees is an option for SaaS models. Strengths * Differentiated access to regions and countries: Venustech offers this by working with Chinese state-owned enterprises, which many Western SIEM vendors have little or no access to. * Advanced batch and stream processing technologies: Venustech uses these to enable advanced security analytics, such as UEBA features (offered as an add-on), and to provide functionality so that users can create their own analytics. * Comprehensive custom rule creation features (including condition trees and graphical views): Rules can be nested for complex correlation, and include thresholds, counts and actions to take. Intelligence enrichment can be configured in a similar way to a TIP solution. Cautions * Support for customers outside China with compliance requirements: Venustech’s SIEM product provides a compliance package for Chinese customers, but at extra licensing cost. Prospective buyers elsewhere should check whether Venustech can support their regulatory compliance requirements. * Support for SaaS apps outside China: Venustech does not support SaaS apps beyond China, and its CIPS support is limited to Alibaba, Tencent, Huawei and Inspur. * Support for third-party solution investments: Venustech’s product may not support, for example, machine-readable threat intelligence solutions. SOAR integration is limited to its own solutions. VENDORS ADDED AND DROPPED We review and adjust our inclusion criteria for Magic Quadrants as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant may change over time. A vendor's appearance in a Magic Quadrant one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor. ADDED * Elastic * Gurucul * Huawei * Microsoft * Odyssey * Sumo Logic * Venustech Note also that NetWitness, a stand-alone business within RSA, replaces Dell Technologies (RSA). DROPPED * AT&T Cybersecurity, which now positions its SIEM offering as a service delivery platform. * HanSight, which did not meet the commercial requirements for inclusion in this Magic Quadrant. * SolarWinds, which did not meet the analytics-related requirements for inclusion in this Magic Quadrant. INCLUSION AND EXCLUSION CRITERIA The inclusion criteria represent the specific attributes that Gartner analysts considered necessary for a vendor to be included in this Magic Quadrant. To qualify for inclusion, a vendor needed to fulfill the following criteria: * The vendor’s product had to provide security information management (SIM) and security event management (SEM) capabilities to end-user customers via software and/or appliance and/or SaaS. * The vendor’s SIEM product had to provide a range of detection analytics, from basic correlation though advanced analytics (such as machine learning for UEBA), via native capabilities or via tight integration with an add-on product sold by the SIEM vendor. * SIEM features, functionality and add-on solutions had to be generally available as of 1 November 2020. * The vendor’s product had to support data capture and analysis from heterogeneous, third-party sources (that is, sources other than the SIEM vendor’s own products and SaaS), including market-leading network technologies, endpoints, servers, and cloud (IaaS or SaaS) and business applications. * The vendor had to have SIEM revenue (product/SaaS license and maintenance revenue, excluding revenue from training, professional and managed services) exceeding $50 million for the 12 months prior to 30 September 2020, or have 250 end-user production customers, or have added 50 new logo end-user production customers as of the end of the same period. Production customers were defined as those who had licensed the SIEM offering and were monitoring production environments with it. * The vendor had to receive 15% of its SIEM product/SaaS revenue for the period 1 October 2019 through 30 September 2020 from outside the region in which it had headquarters, and have at least 15 end-user production customers in each of at least two of the following regions: North America, Europe, the Middle East and Africa (EMEA), Asia/Pacific, Latin America. * The vendor had to have sales and marketing operations (via in-region sales offices or named in-region resellers) targeting at least two of the following regions as of 30 September 2020: North America, EMEA, Asia/Pacific, Latin America. Excluded from consideration were: * Capabilities available only through a managed services relationship — that is, SIEM functionality available to customers only when they sign up for a vendor’s managed security, or managed detection and response, or managed SIEM, or other managed services offering. By managed services, we mean those in which the customer engages the vendor to establish, monitor, escalate and/or respond to alerts, incidents and cases. HONORABLE MENTIONS * AT&T Cybersecurity: This vendor’s USM Anywhere offering is being repositioned as a service delivery platform, rather than a SIEM offering. * Devo: This vendor did not meet the functional or commercial requirements for inclusion in this Magic Quadrant. * Graylog: This vendor did not meet the functional requirements for inclusion in this Magic Quadrant. * HanSight: This vendor did not meet the commercial requirements for inclusion in this Magic Quadrant. It was acquired by Qihoo 360 Technology in June 2020. * Logsign: This vendor did not meet the commercial requirements for inclusion in this Magic Quadrant. * Netsurion: This vendor’s EventTracker solution is positioned more as a service delivery platform than as an end-user SIEM solution. * SolarWinds: This vendor did not meet the requirement for analytics capabilities. EVALUATION CRITERIA ABILITY TO EXECUTE Product or Service: This criterion evaluates a vendor’s ability to provide product functions in areas such as real-time security monitoring, security analytics, incident management and response, reporting, and deployment simplicity, and its track record of doing so. Overall Viability: This criterion includes an assessment of a vendor’s financial health, the financial and practical success of its overall company, and the likelihood that it will continue to invest in SIEM technology. Sales Execution/Pricing: This criterion evaluates a vendor’s success in the SIEM market and its capabilities in presales activities. Considerations include the size of its SIEM revenue and installed base, growth rates for its SIEM revenue and installed base, its presales support, and the overall effectiveness of its sales channel. The level of interest from Gartner clients is also considered. Market Responsiveness/Record: This criterion evaluates how well matched a vendor’s SIEM offering is to the functional requirements expressed by buyers at the time of acquisition, and the vendor’s track record of delivering new functions when they are needed by the market. Also considered is how the vendor differentiates its offerings from those of its major competitors. Marketing Execution: This criterion evaluates a vendor’s SIEM marketing messages in light of Gartner’s understanding of customers’ needs. It also evaluates any variations by industry or geographic segment. Customer Experience: This criterion evaluates product function and service experience in production environments. Included are ease of deployment, operation, administration, stability, scalability and vendor support capabilities. This criterion is assessed on the basis of analysis of feedback received via Gartner’s client inquiry service, reviews on Gartner’s Peer Insights forum, and other interactions with Gartner clients that are using, or have completed competitive evaluations of, a vendor’s SIEM offering. Operations: This criterion evaluates a vendor’s service, support and sales capabilities. It includes an assessment of these capabilities across multiple geographies. TABLE 1: ABILITY TO EXECUTE EVALUATION CRITERIA Enlarge Table * Evaluation CriteriaWeighting Product or Service High Overall Viability Medium Sales Execution/Pricing High Market Responsiveness/Record High Marketing Execution Medium Customer Experience Medium Operations Medium Source: Gartner (June 2021) COMPLETENESS OF VISION Market Understanding: This criterion evaluates a vendor’s ability to understand buyers’ current and emerging needs, and to translate that understanding into products and services. SIEM vendors that show the highest degree of market understanding can adapt to customers’ requirements in areas such as early targeted attack and breach detection, as well as simplified implementation and operation, while also meeting compliance reporting requirements. Marketing Strategy: This criterion evaluates a vendor’s ability to communicate the value and competitive differentiation of its SIEM offering. Sales Strategy: This criterion evaluates a vendor’s use of direct and indirect sales, marketing, service, and communications affiliates to extend the scope and depth of its market reach. Offering (Product) Strategy: This criterion evaluates a vendor’s approach to product development and delivery, with an emphasis on how well functionalities and features correspond to current requirements. Development plans during the next 12 to 18 months are also evaluated. The SIEM market is mature — there is little differentiation between most vendors in areas such as support for common network devices, security devices, OSs and consolidated administration capabilities. We assign higher weightings to coverage of emerging event sources, such as IaaS and SaaS, and environmental context. Despite vendors’ focus on expanding their capabilities, we continue to value simplicity of deployment and ongoing support. Users, especially those with limited IT and security resources, still value this attribute over breadth of coverage beyond basic use cases. SIEM products are complex and tend to become more so as vendors extend their capabilities. Vendors able to provide effective products that users can successfully use as a service, or deploy, configure and manage with limited resources, will be the most successful. We evaluate options for co-managed or hybrid deployments of SIEM technology and supporting services, because growing numbers of Gartner clients are anticipating or requesting ongoing service support for monitoring or managing their SIEM technology deployments. Vertical/Industry Strategy: This criterion evaluates a vendor’s strategy to support SIEM requirements specific to industries. Innovation: This criterion evaluates a vendor’s development and delivery of SIEM technology that is differentiated from that of its competitors in a way that uniquely meets customers’ most important requirements. Product capabilities and customer use in areas such as application layer monitoring, identity-oriented monitoring and incident investigation are evaluated, in addition to other product-specific capabilities that are needed and deployed by customers. Heavy weightings are assigned to capabilities needed for advanced threat detection and incident response: user, data and application monitoring; ad hoc queries; visualization; orchestration and incorporation of context to investigate incidents; and workflow/case management features. Geographic Strategy: This criterion takes account of the fact that, although the North American and EMEA markets produce the most SIEM revenue, Latin America and Asia/Pacific are growth markets for SIEM, and their growth is driven primarily by demand for threat management and secondarily by compliance requirements. Our overall evaluation of vendors in this Magic Quadrant includes an evaluation of their sales and support strategies for those regions, as well as product features to support local and regional compliance requirements for data residency and privacy. TABLE 2: COMPLETENESS OF VISION EVALUATION CRITERIA Enlarge Table * Evaluation CriteriaWeighting Market Understanding High Marketing Strategy Medium Sales Strategy Medium Offering (Product) Strategy High Business Model NotRated Vertical/Industry Strategy Medium Innovation High Geographic Strategy Medium Source: Gartner (June 2021) QUADRANT DESCRIPTIONS LEADERS Leaders provide products that are a strong functional match for the market’s general requirements. These vendors have been the most successful at building an installed base and revenue stream in the SIEM market. In addition to providing technology that is a good match for current customer requirements, Leaders show evidence of superior vision and execution for emerging and anticipated requirements. They typically have a relatively high market share and/or strong revenue growth, and receive positive customer feedback about their SIEM capabilities and related service and support. CHALLENGERS Challengers have multiple product and/or service lines, at least a modestly sized SIEM customer base, and products that meet a subset of the market’s general requirements. As the SIEM market has matured, the number of Challengers has dwindled, to the point that there are none in this edition of the Magic Quadrant. Challengers typically have strong execution capabilities, as evidenced by financial resources and a significant sales and brand presence. However, Challengers either do not demonstrate a complete set of SIEM capabilities or lack a track record of competitive success with SIEM technologies comparable to the track records of Leaders. VISIONARIES Visionaries provide products that are a strong functional match for the SIEM market’s general requirements, but have less Ability to Execute than Leaders. Their lower Ability to Execute is typically due to lower scores for product features and functions, or to a smaller presence in the SIEM market than that of the Leaders, as measured by installed base, revenue size or growth, overall company size or general viability (or a combination of these attributes). NICHE PLAYERS Niche Players are primarily vendors that provide SIEM technology that is a good match for a specific SIEM use case or a subset of the SIEM market’s functional requirements. Niche Players focus on a particular segment of the client base (such as midsize organizations, service providers, or a specific region or industry) or may provide a limited set of SIEM capabilities. In addition, Niche Players may have a small installed base or be limited, according to Gartner’s criteria, by other factors. These factors may include limited investments or capabilities, a geographically limited footprint, or other inhibitors to providing a broad set of capabilities to organizations now and during a 12-month planning period. Inclusion in this quadrant does not reflect negatively on a vendor’s value for narrowly focused markets or use cases. CONTEXT SIEM technologies provide core SIM and SEM functions, along with a variety of advanced features and complementary solutions and capabilities. They support near-real-time security event monitoring, threat detection (both in real time and via historical analysis), incident investigation and response, and compliance requirements. Core functions include: * Collection of security event information from a wide variety of sources in a central repository, where it can be processed and stored in various forms (such as, raw version, enriched and normalized). * Real-time and historical analysis, and alerting to potential threats. * Reporting and dashboards. * Searching across historical data for forensics and threat hunting. * Workflow and case management. * Integrations and automation to extend the value proposition and enable more functionality. SIEM technology is typically deployed to: * Monitor, correlate and analyze activity across multiple systems and applications. * Discover external and internal threats. * Monitor the activities of users and specific types of users, such as those with privileged access (both internal and third parties), and users with access to critical data assets (such as intellectual property), and executives. * Monitor server and database resource access, and offer some data exfiltration monitoring capabilities * Support compliance requirements and provide compliance reporting. * Provide analytics and workflow to support incident response, hunt for threats, and, increasingly, orchestrate and automate actions and workflows, thus powering SOC-type use cases. SIEM technology aggregates and analyzes the event data produced by networks, devices, systems and applications. The primary data source has been time-series-based log data, but SIEM technology is evolving to process (e.g., for real-time monitoring) and leverage (e.g., for incident investigation and response) other forms of data to obtain context about users, IT assets, data, applications, threats and vulnerabilities (e.g., Active Directory [AD], configuration management database [CMDB], vulnerability management data, HR information and threat intelligence). MARKET OVERVIEW The SIEM market grew from $3.55 billion in 2019 to $3.58 billion in 2020 (see Market Share: All Software Markets, Worldwide, 2020). Threat management (and specifically threat detection and response) remains the primary driver, with general monitoring and compliance being secondary. In North America, many new deployments are undertaken by organizations with limited security resources but requirements to improve monitoring and breach detection, often at the insistence of larger customers or business partners. Most SIEM buyers regard support for compliance reporting as a bare minimum. Larger companies that are conservative adopters of technology are also deploying SIEM. These large, late adopters — as well as many smaller organizations — value simplicity of deployment and operational support, and have therefore fueled interest in cloud-based SIEM delivered as a service. We continue to see organizations of all sizes reevaluate their SIEM vendors in order to replace SIEM technology associated with incomplete, marginal or failed deployments, or to offer better analytics and automation support for analysts undertaking investigation and response activities. The SIEM market is mature and competitive. During this phase of broad adoption, multiple vendors can meet the basic requirements of typical customers. The greatest area of unmet need concerns effective detection of, and response to, targeted attacks and breaches. Effective use of threat intelligence, behavior profiling and analytics can improve detection success. SIEM vendors continue to increase their native support for behavior analysis capabilities, as well as their integrations with third-party technologies, and Gartner customers are increasingly expressing interest in developing use cases based on behavior. Customers are also adding monitoring of IaaS environments and workloads, and SaaS applications, to the scope of monitoring required for SIEM deployments. SIEM deployments tend to grow in scope over a three-year period to include more use cases and more event sources, and more integrations with complementary technologies such as EDR, NDR and SOAR. However, as organizations reconcile themselves to more distributed workforces and the demand to respond to threats faster, some solutions, like SOAR and EDR, may, in combination with a SIEM product, become parts of an initial deployment. Additionally, as the number of use cases increases, and as they become more complex, there is typically greater demand for resources to run, tune and operate SIEM products, and to respond to incidents. SIEM VENDOR LANDSCAPE Although the SIEM technology market has many mature vendors, there continues to be an influx of new vendors aiming to compete against them. The vendor landscape for SIEM therefore remains dynamic, with established providers and recent entrants delivering cloud-based SaaS offerings, and adding or expanding advanced analytic techniques to help identify and prioritize threats. SIEM vendors continue to improve their investigation and response capabilities through native features and integrations with third-party SOAR solutions. The SIEM market is characterized by a small number of vendors with large customer bases, and others with smaller, but rapidly increasing customer bases. Splunk, Micro Focus, IBM and LogRhythm command a significant share of the market’s revenue. Elastic, Sumo Logic and Gurucul have capabilities that meet the functional requirements for SIEM, and now fulfill the market criteria for inclusion in this Magic Quadrant. There are several vendors with smaller market shares that generate strong interest among Gartner customers, due to their strength in supporting analytics-focused use cases or their SaaS consumption model, or both. Other vendors are of interest to distinct market segments, such as buyers of their other products, buyers with geographic preferences, and buyers seeking add-on monitoring services from a technology provider. SIEM SERVICES Many Gartner clients indicate that they are seeking external service support for their SIEM deployment, or that they plan to acquire that support in conjunction with a SIEM product. Many indicate a lack of internal resources to manage a SIEM deployment, a lack of resources to perform real-time alert monitoring or a lack of expertise to expand a deployment for new use cases. We expect demand by SIEM users for such services to continue to grow as more customers face 24/7 monitoring requirements and implement use cases that require deeper SIEM operational and analytics expertise. We also expect increased interest in acquiring use-case content via third-party vendors, such as SOC Prime, or the user communities associated with several SIEM products. SIEM vendors have moved to address customer resource shortages in several ways. By offering SIEM as SaaS, vendors have eliminated the need for customers to maintain the underlying technology platform, because the vendors provide that support. However, customers must still provide their own resources (or use other service providers) to configure content and monitor and investigate events raised by the SIEM solution. A few SIEM vendors offer managed services delivered by their own staff, so customers can acquire the technology and services from a single vendor. MSSPs, which offer real-time monitoring and analysis of events, and collect logs for reporting and investigation, are another option for SIEM users. Customer-specific requirements for event collection and storage, alerting, investigation, and reporting may prove problematic for external service providers. SIEM users exploring services should evaluate the suitability of providers for current and planned use cases, especially those that include monitoring of SaaS and IaaS. SIEM ALTERNATIVES The complexity and cost of buying and running SIEM products, and the emergence of other security analytics technologies, has fueled interest in alternative approaches to collecting and analyzing event data to identify and respond to attacks. These alternatives include: * Event collection and analytics platforms: These event collection and analytics products can tackle some SIEM use cases, and possibly other nonsecurity use cases, and may make it easier for buyers to spread the cost across several budgets and develop a broader pool of internal expertise. However, these products may lack support for the full range of capabilities available in a SIEM solution, and may require more user development of detection or investigation content. * Extended detection and response products: These emerging offerings are integrated suites of protection, detection and response products for endpoints, networks and the cloud (see Innovation Insight for Extended Detection and Response). They are configured by their vendors to provide automated threat detection and response capabilities within the scope of those products. XDR platforms may provide curated, largely “hands off” detection and response capabilities for organizations that can commit to a single-vendor approach and accept the vendor-defined and vendor-managed threat detection and response options. Organizations need to understand how they might cover use cases that cannot be addressed by XDR products. Interestingly, as XDR technology evolves, Gartner is seeing some vendors, such as FireEye, Gurucul, McAfee and Securonix, treat their SIEM solution as part of an XDR offering — a trend we expect to continue. * Managed detection and response services: There is a broad range of delivery styles for these services, but the focus is the provider’s investigation, validation, and presentation of containment and remediation advice for security events, rather than the escalation of lightly triaged alerts to the customer. Increasingly, providers are able to offer, and customers are willing to accept, actions to contain or disrupt events, typically via endpoint or network-based controls. These providers vary in their abilities to monitor a customer’s range of security controls and to collect logs for compliance reporting. For further details, see Market Guide for Managed Detection and Response Services. EVALUATION CRITERIA DEFINITIONS ABILITY TO EXECUTE Product/Service: Core goods and services offered by the vendor for the defined market. This includes current product/service capabilities, quality, feature sets, skills and so on, whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability: Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood that the individual business unit will continue investing in the product, will continue offering the product and will advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor's capabilities in all presales activities and the structure that supports them. This includes deal management, pricing and negotiation, presales support, and the overall effectiveness of the sales channel. Market Responsiveness/Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional initiatives, thought leadership, word of mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service-level agreements and so on. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. COMPLETENESS OF VISION Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling products that uses the appropriate network of direct and indirect sales, marketing, service, and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature sets as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including vertical markets. Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. IS THIS CONTENT HELPFUL TO YOU? YesNo © 2022 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. It consists of the opinions of Gartner's research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see "Guiding Principles on Independence and Objectivity." * About * Careers * Newsroom * Policies * Site Index * IT Glossary * Gartner Blog Network * Contact * Send Feedback © 2022 Gartner, Inc. and/or its Affiliates. All Rights Reserved. SWITCHING TO SIMPLIFIED SITE Your browser version is not supported by Gartner.com. Switching to the simplified version of the site some features will no longer be available to you, but overall experience will be improved. Your browser version is currently supported by Gartner.com. If you change to the simplified version of the site, some features will no longer be available to you. WE USE COOKIES TO IMPROVE YOUR EXPERIENCE We use cookies to deliver the best possible experience on our website. To learn more, visit our Privacy Policy. By continuing to use this site, or closing this box, you consent to our use of cookies. Cookie Notice. Accept PRIVACY PREFERENCE CENTER We use cookies to deliver the best possible experience on our website. To learn more, visit our Privacy Policy. By continuing to use this site, or closing this box, you consent to our use of cookies. Cookie Notice. Accept all SELECT COOKIES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. View Vendor Details TARGETING COOKIES Always Active These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. View Vendor Details FUNCTIONAL COOKIES Always Active These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. View Vendor Details PERFORMANCE COOKIES Always Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. View Vendor Details Back Button PERFORMANCE COOKIES Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Cookies * Name cookie name Select and proceed