Gartner releases 2014 SIEM Magic Quadrant

Gartner has released the annual SIEM Magic Quadrant and SIEM Critical Capabilities documents, naming the leaders of the SIEM technology landscape and hi-lighting current technology trends and deficiencies.

The greatest area of unmet need is effective targeted attack and breach detection,” according to Gartner report authors Kelly Kavanagh, principal research analyst, Mark Nicolett, managing vice president, and Oliver Rochford, research director. “Organizations are failing at early breach detection, with more than 92% of breaches undetected by the breached organization. The situation can be improved with stronger threat intelligence, the addition of behavior profiling and better analytics.

Gartner1-Magic Quadrant June 2014

The 2014 Gartner SIEM Magic Quadrant names IBM, HP, Splunk, McAfee and Logrythm as the leaders of the industry. I names EMC and NetIQ as the Challengers and AlienVault as the visionary.  On his blog Anton Chuvakin, Gartner Research Vice President for Technical Professionals (GTP) Security and Risk Management group, hi-lights a number of conclusions in the 2014 report:

  • “Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs.” and “Breach detection is the primary driver, and compliance remains a secondary driver.”
  • “SIEM is a $1.5 billion market that grew 16% during 2013 — with an expected growth rate of 12.4% during 2014.” and “During this period [past year], the number of Gartner inquiry calls from end-user clients with funded SIEM projects increased by 12% over the previous 12 months”
  • “Analytics are an important [SIEM] capability to support the early detection of targeted attacks and breaches. […] Initial deployments of the “separate analytics back store” approach have been implemented by a small number of Type A companies.”
  • “The SIEM market is mature and very competitive. […] The greatest area of unmet need is effective targeted attack and breach detection. […]The situation can be improved with stronger threat intelligence, the addition of behavior profiling and better analytics. ”
,

Leave a Reply

Your email address will not be published. Required fields are marked *