Security Information and Event Management Tools
SIEM platforms for centralized security log management, correlation, alerting, and compliance reporting.
Browse 197 security information and event management tools
FEATURED
USE CASES
POPULAR
TRENDING CATEGORIES
Digital Forensics and Incident Response
Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.
509
Threat Intelligence Platforms
TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.
357
Penetration Testing
Penetration testing tools and frameworks for manual security testing, exploit development, and vulnerability validation.
263
Offensive Security
Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.
246
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
230
View All Categories →Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox
197 tools · 39 free, 158 commercial|Related:
Security Information and Event Management Tools FAQ
Common questions about Security Information and Event Management tools, selection guides, pricing, and comparisons.
Priority log sources: identity systems (Active Directory, SSO, MFA), endpoint security (EDR, antivirus), network devices (firewalls, proxies, DNS), cloud platforms (AWS CloudTrail, Azure Activity Log, GCP Audit Logs), email security, and critical application logs. Start with identity and endpoint logs as they detect the most common attack patterns, then expand based on your threat model.
Have more questions? Browse our categories or search for specific tools.