Верхнее

Gartner Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management 2016

10.08.2016 G00290113 AlienVault, BlackStratus, EMC (RSA), EventTracker, Fortinet (AccelOps), HPE, IBM, Intel Security, LogRhythm, ManageEngine, Micro Focus, SolarWinds, Splunk, Trustwave

The need for early targeted attack detection and response is driving the expansion of new and existing SIEM deployments. Advanced users seek SIEM with advanced profiling, analytics and response features.

Полный текст >> (ссылка устарела? — напишите, возможно, у меня есть оригинал в архиве)

Magic Quadrant for Security Information and Event Management 2015

20.07.2015 G00267505 IBM Security, Splunk, HP, Intel Security, LogRhythm, EMC (RSA), AlienVault, Trustwave, MicroFocus (NetIQ), SolarWinds, AccelOps, EventTracker, BlackStratus.

The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.

Magic Quadrant for Security Information and Event Management 2014

25.06.2014 G00261641 IBM Security, HP, McAfee, Splunk, LogRhythm, EMC (RSA), NetIQ, AlienVault, Trustwave, SolarWinds, Tibco Software, Tenable Network Security, AccelOps, EventTracker, BlackStratus

Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics.

Magic Quadrant for Security Information and Event Management 2013

07.05.2013 G00246886 AlienVault, EiQ Networks, EMC-RSA, EventTracker, HP-ArcSight, IBM-Q1 Labs, LogRhythm, McAfee, NetIQ, Sensage, SolarWinds, Splunk, Symantec, Tenable Network Security, Tibco-LogLogic, Trustwave.

Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics.

Comments are closed.