getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

SIEM Software - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


34 software options

LogRhythm SIEM logo

Self-hosted security information and event management

learn more
LogRhythm SIEM is a self-hosted security information and event management solution featuring Machine Data Intelligence Fabric that contextualizes data at ingestion. The platform includes over one thousand out-of-the-box correlation rules mapped to the MITRE ATT&CK framework, embedded SOAR capabilities, and twenty-eight compliance modules for standards like ISO 27001 and GDPR. The system offers a unified interface for streamlined threat detection, investigation, and response workflows.

Read more about LogRhythm SIEM

Users also considered
OpenText Core Behavioral Signals logo

Vulnerability scanning and threat intelligence software

learn more
ArcSight is a vulnerability scanning software that helps businesses utilize machine learning technology to detect threats, handle investigations, create prioritized event lists, and more on a centralized platform. It enables staff members to extract entities from log files and observe events and behavior across users, IP addresses, servers, and machines.

Read more about OpenText Core Behavioral Signals

Users also considered
AlienVault OSSIM logo

Open source SIEM software

learn more
AlienVault OSSIM is a open source security information and event management (SIEM) software.

Read more about AlienVault OSSIM

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.

Avoid SIEM "shelfware" with a robust co-managed SIEM and 24/7 SOC.

Read more about Netsurion

Users also considered
M365 Manager Plus logo

Management, reporting, auditing, and monitoring of Microsoft

learn more
M365 Manager Plus is a reporting, auditing, monitoring, management, and security solution for Microsoft 365. Designed for businesses of all sizes, it helps users manage Exchange Online, Azure AD, Microsoft Teams, OneDrive for Business, and other services from a centralized dashboard.

Read more about M365 Manager Plus

Users also considered
Snare  logo

Security information and event management (SIEM) solution

learn more
Snare is a suite of security information and event management (SIEM) solutions designed to help businesses in industries such as healthcare, retail, financial services, energy and utilities manage and streamline processes related to log monitoring, threat intelligence, agent management and more.

Read more about Snare

Users also considered
SYRN logo

Intel platform for vulnerability management

learn more
SYRN is a threat intelligence platform that helps cybersecurity teams monitor vulnerabilities and manage their attack surface. The platform automatically detects and catalogs technologies across infrastructure environments, correlates them with CVE databases and threat intelligence feeds from over fifteen sources, and generates prioritized remediation plans using its proprietary scoring system that combines CVSS, EPSS, exploit availability, and organizational context.

Read more about SYRN

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
Trunc logo

Log management and SIEM platform

learn more
Trunc aggregates logs into one centralized location, allowing for better analysis and visualization. It is a powerful SIEM capable of identifying issues and notifying DevOps teams of important incidents.

Read more about Trunc

Users also considered