Gartner Research

Competitive Landscape: Security Information and Event Management, Worldwide, 2013

Published: 26 June 2013

ID: G00250670

Analyst(s): Ruggero Contu , Lawrence Pingree


Expanding visibility, big data integration and performance all top the minds of SIEM technology providers as they adjust their offerings to counter the advancing threats posed by nation states, hactivists and risky insiders.

Table Of Contents


  • Market Definition
  • Competitive Situation and Trends
    • Market Share Estimates and Analysis
  • Current Trends
    • Addressing Compliance Requirements for Customers Continues to Be a Critical Driver to Deploying SIEM Technologies
    • Endpoint Information and Vulnerability State Bring Real-Time Endpoint Event Relevancy, Enhancing the Efficiency of Threat Investigations
    • IP Address Reputation Feeds and Blacklists Enhance the Value of Log Data With Contextual Threat Information From Outside of the Enterprise Environment
    • "Situational Awareness" Emerges as a Dominating Marketing Theme in the SIEM market
    • SIEM Providers Explore User Identity to Behaviorally Profile Users and Correlate Their Events to User Access Roles and Access Governance Mandates
    • Network Flow Analysis Provides Enhanced Visibility and Detection Capabilities From the Network Layer
  • Emerging Trends
    • SIEM Providers Seek Out Ways to Leverage Interest in Big Data Analytics for Growing Data Volume
    • Advanced Targeted Attacks (Also Called Advanced Persistent Threats) Becoming a Key Driver for SIEM Technology
    • Network Forensics, Data Discovery and Data Classification Emerge in SIEM Products
  • Market Players
  • The Future of Competition
  • Competitive Profiles
    • HP (ArcSight)
    • IBM (Q1 Labs)
    • EMC (RSA)
    • NetIQ (Attachmate)
    • Splunk
    • LogRhythm
    • Tibco (Formerly LogLogic)
    • McAfee (NitroSecurity)
    • Symantec
    • SolarWinds
  • References and Methodology

Recommended Reading

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Purchase this Document

To purchase this document, you will need to register or sign in above

Become a client

Learn how to access this content as a Gartner client.