Home

SIEM Perceptions and Adoption

SIEM Perceptions and Adoption

Are tech leaders turning to SIEM (security information event management) as a tool in the modern cybersecurity threat landscape?

Are you deploying SIEM in your organization?

73%Yes
27%No
0 views
388 responses

When are you planning to deploy SIEM?

3%Within 1-3 months
8%Within 4-6 months
25%Within 7-12 months
65%It’s not on our roadmap
0 views
108 responses

Are you more or less satisfied with your security posture since adopting SIEM?

13%Significantly more satisfied
45%Moderately more satisfied
27%Slightly more satisfied
10%Neither more or less satisfied
4%Slightly less satisfied
1%Moderately less satisfied
1%Significantly less satisfied
0 views
276 responses

To what extent do you agree with the following: “Threat detection has improved since we deployed SIEM”

16%Strongly agree
78%Agree
5%Disagree
1%Strongly disagree
0 views
275 responses

Did you deploy SIEM internally or use a managed security service provider (MSSP)?

36%Internally
50%MSSP setup, internally managed
14%MSSP setup and management
0 views
274 responses

What are the top desired benefits of SIEM? Select all that apply (scroll down for more options)

63%Faster threat detection
63%Increased security operations efficiency
60%Centralized visibility
17%Edge compute
55%Improved threat analysis
35%Improved compliance reporting
37%Response automation
33%Response prioritization
19%Interoperability with hybrid/multi cloud
4%None of the above
0%Other
0 views
377 responses

What types of attacks/incidents is a SIEM product best suited to detect? Select all that apply (scroll down for more options)

28%Man-in-the-middle (MitM)
52%D/DDoS
25%Eavesdropping
49%Web-based (e.g. SQL injection)
34%DNS tunneling
48%Malicious insider threats
37%Accidental insider threats
33%Data exfiltration
32%Account takeover
22%Zero-day
24%Lateral movement
31%Phishing emails
41%Malware
2%None of the above
0%Other
0 views
372 responses

What features do you want in a SIEM product? Select 3 (scroll down for more options)

66%Intelligent threat detection
43%Compliance logging
56%Automated notifications
24%Timeline generation
45%Intelligent response
24%System outage alerts
24%System performance tracking
46%Threat prioritization
35%Single pane of glass analytics
1%None of the above
0%Other
0 views
371 responses

What are the top business cases for SIEM deployment? Select all that apply (scroll down for more options)

44%Brand protection/reputation
73%Enhanced cybersecurity risk management
35%Scalability
55%Increased visibility
30%Cost reduction
39%Reporting
50%Compliance
3%None of the above
0%Other
0 views
370 responses

How would you rate the average price point of SIEM products?

25%Significantly more than I’d like to spend
45%Moderately more than I’d like to spend
20%Slightly more than I’d like to spend
6%Fair price point
5%Not sure
0 views
370 responses

What are your perceived disadvantages of SIEM? Select all that apply (scroll down for more options)

64%Costs
58%Skills requirements/training
54%Defining useful data from noise
29%Maintenance issues
43%Lack of out-of-the-box deployment
30%Compatibility issues
3%None of the above
0%Other
0 views
370 responses

Based on your understanding of the modern threat landscape, what is the most critical capability for latest generation SIEM technology? (scroll down for more options)

31%Complex threat identification
25%User and Entity Behavior Analytics (UEBA)
26%Security Orchestration, Automation and Response (SOAR)
10%Intelligent identification/response
6%Detection without rules or signatures
2%Lateral movement detection
0%Other
0 views
370 responses

What would you like to see from SIEM vendors? Select all that apply (scroll down for more options)

49%Realistic product expectations
50%Implementation assistance
40%Training materials
49%Ongoing integration management
26%More personalized products
45%A willingness to understand my specific requirements
49%Lower costs
3%None of the above
0%Other
0 views
370 responses