Home

SIEM Perceptions and Adoption

SIEM Perceptions and Adoption

Are tech leaders turning to SIEM (security information event management) as a tool in the modern cybersecurity threat landscape?

Are you deploying SIEM in your organization?

71%Yes
29%No
0 views
365 responses

When are you planning to deploy SIEM?

2%Within 1-3 months
8%Within 4-6 months
25%Within 7-12 months
65%It’s not on our roadmap
0 views
107 responses

Are you more or less satisfied with your security posture since adopting SIEM?

13%Significantly more satisfied
44%Moderately more satisfied
27%Slightly more satisfied
10%Neither more or less satisfied
4%Slightly less satisfied
1%Moderately less satisfied
1%Significantly less satisfied
0 views
254 responses

To what extent do you agree with the following: “Threat detection has improved since we deployed SIEM”

17%Strongly agree
77%Agree
5%Disagree
1%Strongly disagree
0 views
253 responses

Did you deploy SIEM internally or use a managed security service provider (MSSP)?

35%Internally
49%MSSP setup, internally managed
16%MSSP setup and management
0 views
252 responses

What are the top desired benefits of SIEM? Select all that apply (scroll down for more options)

65%Faster threat detection
63%Increased security operations efficiency
60%Centralized visibility
16%Edge compute
57%Improved threat analysis
37%Improved compliance reporting
38%Response automation
35%Response prioritization
21%Interoperability with hybrid/multi cloud
4%None of the above
0%Other
0 views
354 responses

What types of attacks/incidents is a SIEM product best suited to detect? Select all that apply (scroll down for more options)

29%Man-in-the-middle (MitM)
53%D/DDoS
22%Eavesdropping
48%Web-based (e.g. SQL injection)
34%DNS tunneling
50%Malicious insider threats
38%Accidental insider threats
35%Data exfiltration
34%Account takeover
24%Zero-day
25%Lateral movement
33%Phishing emails
43%Malware
2%None of the above
0%Other
0 views
349 responses

What features do you want in a SIEM product? Select 3 (scroll down for more options)

69%Intelligent threat detection
42%Compliance logging
54%Automated notifications
22%Timeline generation
46%Intelligent response
24%System outage alerts
26%System performance tracking
48%Threat prioritization
37%Single pane of glass analytics
1%None of the above
0%Other
0 views
348 responses

What are the top business cases for SIEM deployment? Select all that apply (scroll down for more options)

46%Brand protection/reputation
75%Enhanced cybersecurity risk management
34%Scalability
55%Increased visibility
30%Cost reduction
41%Reporting
52%Compliance
3%None of the above
0%Other
0 views
347 responses

How would you rate the average price point of SIEM products?

25%Significantly more than I’d like to spend
44%Moderately more than I’d like to spend
20%Slightly more than I’d like to spend
6%Fair price point
5%Not sure
0 views
347 responses

What are your perceived disadvantages of SIEM? Select all that apply (scroll down for more options)

66%Costs
57%Skills requirements/training
52%Defining useful data from noise
28%Maintenance issues
44%Lack of out-of-the-box deployment
31%Compatibility issues
3%None of the above
0%Other
0 views
347 responses

Based on your understanding of the modern threat landscape, what is the most critical capability for latest generation SIEM technology? (scroll down for more options)

32%Complex threat identification
23%User and Entity Behavior Analytics (UEBA)
26%Security Orchestration, Automation and Response (SOAR)
10%Intelligent identification/response
7%Detection without rules or signatures
2%Lateral movement detection
0%Other
0 views
347 responses

What would you like to see from SIEM vendors? Select all that apply (scroll down for more options)

51%Realistic product expectations
49%Implementation assistance
37%Training materials
49%Ongoing integration management
25%More personalized products
47%A willingness to understand my specific requirements
51%Lower costs
3%None of the above
0%Other
0 views
347 responses