SC Magazine recently awarded HP ArcSight, solutions ESM (Enterprise Security Manager) and ADP (ArcSight Data Platform) formerly known as Logger, as the best SIEM Solution in the market. This is a great follow-up after HP took awards in 6 categories at the Info Security Global Excellence awards last month.
EMC d.o.o. Sarajevo is a regional leader in the implementation of HPE ArcSight products. This year, IBM QRadar, one of the main competitors of HPE ArcSight solutions, did not managed to be among the finalists. SC Magazine list of finalists has been published as follows:
- HPE ArcSight Security Manager (ESM) and ArcSight Data Platform (ADP)
- LogRhythm for Security Intelligence and Analytics Platform
- Rapid7 InsightIDR
- RSA NetWitness Suite
- Splunk Enterprise Security 4.5 (ES) with Adaptive Response
HPE ArcSight has protected enterprises for over a decade, evolving over years as a SIEM market leader (Gartner MQ 2016 for SIEM). ArcSight addresses sophisticated attacks, needs for quick resolution under shortage of security personnel. ArcSight Data Platform (ADP) collects data from any source and enriches it with security context, consolidates the information for maximum storage and retrieval efficiency. ArcSight Enterprise Security Manager (ESM) is for analyzing and correlating every event that occurs, enabling to get a quick and accurate picture of users, apps and data, to protect and respond to attacks in real-time.
ArcSight ADP can support large SOC (Security Operations Center) by allowing 100 concurent searches. ArcSight is the only open architecture SIEM solution in the market and is better equipped for SOC use cases where multiple products from different vendors are used. ArcSight collects and sends data any-where, from existing solutions or in-house applications.
The SC Awards are recognized throughout the cybersecurity industry and are a crowning achievement for IT security professionals and products. The awards are judged by an independent panel of judges comprised of more than 70 cybersecurity industry people from IT security, from current and former CISO's to vendor-neutral consultants or analysts.
The complete article can be downloaded from the following website https://media.scmagazine.com/documents/286/botn2017_71287.pdf