Best Security Information and Event Management Products 2010

Security information and event management and log management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.

[GOLD]
Symantec Security Information Manager
Symantec

After last year's second place finish in the SIEM category, Symantec took home the gold this year with its Security Information Manager. The product garnered top marks from readers for its ease of integration and compatibility with existing systems -- an important feature for a product type known to require a longer deployment timeline. It also scored highly for its granular and flexible policy definitions, event correlation capabilities and data archiving, making it a solid standout.

[SILVER]
Trend Micro Control Manager
Trend Micro

Perhaps known more for its antivirus and anti-spam products, Trend Micro came in second this year with its Control Manager. The product earned solid marks for its ease of installation -- a feature for which SIEM is not generally known -- and ROI. In addition, readers were generally pleased with its effective dashboard and ease of integration, and gave respectable marks for the product's ability to map data to policy or compliance requirements.

[BRONZE]
ArcSight ESM
ArcSight

Coming in third was ArcSight's Enterprise Security Manager (ESM), which was singled out for its ability to map network and application data to security policy or compliance regulations: a key driver for many enterprise SIEM implementations. Readers also gave the product high marks for event correlation and the effectiveness of the dashboard in visualizing status and implementing policy, with only slightly lower marks than Symantec for data archiving.


2010 READERS' CHOICE AWARDS WINNERS

  Introduction and Methodology
  Best Antimalware Products
Readers vote on the best business-grade desktop and server antivirus and antispyware products.
  Best Authentication Products
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards.
  Best Data Loss Prevention Products
Readers vote on the best network, client and combined data loss prevention software and appliances for enterprise and midmarket deployments.
  Best Identity and Access Management Products
Readers vote on the best identity and access management products, including user identity access privilege and authorization management, single sign-on, user identity provisioning.
  Best Intrusion Detection and Prevention Products
Readers vote on the best intrusion prevention/detection products, including network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based detection.
  Best Messaging Security Products
Readers vote on the best antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services.
  Best Mobile Data Security Products
Readers vote on the best mobile data security products, including hardware- and software-based file and full disk laptop encryption and removable storage device protection.
  Best Network Access Control Products
Readers vote for the best NAC products, including appliance, software and infrastructure user and device network access policy creation, compliance, enforcement and remediation.
  Best Network Firewalls
Readers vote on the best network firewalls, including enterprise-caliber network firewall appliances and software, and stateful packet filtering firewalls with advanced application/protocol layer filtering.
  Best Secure Remote Access Products
Readers vote on the best remote access products, including IPsec VPN, SSL VPN, and combined systems and products, as well as other remote access products and services.
  Best Security Information and Event Management Products
Security information and event management and log management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.
  Best Unified Threat Management Products
Readers voted on the best unified threat management products, including UTM appliances that feature firewall, VPN, gateway antivirusm URL Web filtering and antispam.
  Best Vulnerability Management Products
Readers vote on the best vulnerability management products, including network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management and vulnerability management lifecycle products.
  Best Web Security Gateway Products
Readers vote on the best Web security gateway products, including software and hardware, hosted Web services for inbound and outbound content filtering for malware activity detection and prevention.
This was first published in September 2010

Dig deeper on Security Event Management

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close