getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

SIEM Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


41 software options

ManageEngine Log360 logo

Log management and SIEM management solution

visit website
ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage network security, audit Active Directory changes, log devices, and gain visibility into cloud infrastructures.

Read more about ManageEngine Log360

Users also considered
Heimdal Threat-hunting & Action Center logo

SIEM and threat intelligence solution

visit website
The Heimdal Threat-Hunting and Action Center is a comprehensive platform that offers advanced features to detect, analyze, and mitigate cyber threats in real-time. With a unified interface and a single pane of glass view, security teams can visualize and monitor their entire digital landscape.

Read more about Heimdal Threat-hunting & Action Center

Users also considered
BusinessLOG logo

AI-powered log management, SIEM, compliance, DLP, and asset

visit website
Powerful network control and management features make Business LOG AI a next-generation log management and cybersecurity platform.

Read more about BusinessLOG

Users also considered
Fidelis Elevate logo

Extended Detection and Response (XDR) Cybersecurity Platform

visit website
Fidelis Elevate is a cloud-based XDR Solution that delivers endpoint security, network security, deception, and Active Directory protection in a single platform.

Read more about Fidelis Elevate

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
M365 Manager Plus logo

Management, reporting, auditing, and monitoring of Microsoft

learn more
M365 Manager Plus is a reporting, auditing, monitoring, management, and security solution for Microsoft 365. Designed for businesses of all sizes, it helps users manage Exchange Online, Azure AD, Microsoft Teams, OneDrive for Business, and other services from a centralized dashboard.

Read more about M365 Manager Plus

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Quadrant XDR logo

Around-the-clock threat detection and response

learn more
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered
Blumira logo

Automated SIEM + XDR for IT Teams

learn more
Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

Read more about Blumira

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
The Enginsight SIEM offers you real-time protection and comprehensive security information across all data sources. All software components work together and automatically enrich the SIEM with information from attack detection. Proactive protection instead of reactive logging.

Read more about Enginsight

Users also considered
Graylog logo

Log Management | SIEM | API Security

learn more
Graylog is an open, AI-powered SIEM that helps security and IT teams detect threats faster, reduce alert noise, and control security data costs across cloud and on-prem environments.

Read more about Graylog

Users also considered
Splunk Enterprise logo

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
CybrHawk SIEM XDR logo

Transforming cybersecurity with unprecedented visibility

learn more
Delivering top-notch cybersecurity solutions to protect businesses from evolving threats. Stay ahead with our cutting-edge technologies, comprehensive services, and expert team. Visit www.cybrhawk.com for robust protection and peace of mind in the digital landscape.

Read more about CybrHawk SIEM XDR

Users also considered
IBM Security QRadar logo

Security information & event management (SIEM) platform

learn more
IBM QRadar SIEM is a security information & event management software for security teams to accurately detect and prioritize threats across the organizations, providing intelligent insights that enable security analysts to respond quickly and reduce the impact of incidents

Read more about IBM Security QRadar

Users also considered
ManageEngine Log360 Cloud logo

Cloud SIEM solution for a secure IT infrastructure

learn more
ManageEngine Log360 Cloud is a unified cloud SIEM solution with integrated CASB capabilities that helps enterprises secure their network from cyberattacks. With its security analytics, threat intelligence, and incident management capabilities, Log360 Cloud helps security analysts spot, prioritize, and resolve issues.

Read more about ManageEngine Log360 Cloud

Users also considered
SEKOIA.IO logo

Neutralize Cyber Threats Before Impact

learn more
SEKOIA.IO is a SecOps platform, designed to deliver comprehensive Detection and Response before impact.

Read more about SEKOIA.IO

Users also considered
Reveelium logo

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
SentinelOne logo

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
USM Anywhere logo

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
LogRhythm SIEM logo

Self-hosted security information and event management

learn more
LogRhythm SIEM is a self-hosted security information and event management solution featuring Machine Data Intelligence Fabric that contextualizes data at ingestion. The platform includes over one thousand out-of-the-box correlation rules mapped to the MITRE ATT&CK framework, embedded SOAR capabilities, and twenty-eight compliance modules for standards like ISO 27001 and GDPR. The system offers a unified interface for streamlined threat detection, investigation, and response workflows.

Read more about LogRhythm SIEM

Users also considered
Google Cloud logo

Modular platform for computing, hosting, storage and more

learn more
Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.

Read more about Google Cloud

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Panther logo

Cloud-based security information and event management tool

learn more
Panther offers security event analysis and information management tools to assist IT experts in identifying potential threats and resolving security incidents. Key features include real-time monitoring, log management, access control, database security, malware detection, and alert tools.

Read more about Panther

Users also considered
SilverSky Managed Security Services logo

Security device monitoring and management

learn more
SilverSky Managed Security Services is a cloud-based cybersecurity platform that helps businesses monitor firewalls and automate remediation processes to handle threats. Features include routing, authentication, issue tracking, encryption, content filtering, log management, and analytics.

Read more about SilverSky Managed Security Services

Users also considered
Datadog logo

Cloud-Scale Monitoring Platform For Dev, Sec, and Ops teams.

learn more
Secure your tech stack with Datadog Security Monitoring's real-time threat detection. Set up key security integrations in minutes; apply OOTB Detection Rules without a query language; and correlate security signals to investigate suspicious activity.

Read more about Datadog

Users also considered

Popular siem comparisons