Securonix’s market leadership has been validated repeatedly by the top industry analysts, including as a four-time leader in the Gartner Magic Quadrant for Security Information and Event Management (SIEM) and recognized among the three highest scoring vendors in all three Use Cases in the 2022 Gartner Critical Capabilities for SIEM.
We’re proud to kick off 2023 with another significant validation, as IDC has positioned Securonix in the Major Players category in the 2022 IDC MarketScape for worldwide Security Information and Event Management (SIEM) software. This comes on the heels of Gartner positioning the company in the top three highest scores in all three use cases in the 2022 Gartner Critical Capabilities for SIEM.
Among the 14 vendors evaluated for IDC’s report, Securonix ranked in the top three for capabilities. The IDC MarketScape report recognized specific strengths for Securonix, including:
- Its latest investment round has provided Securonix with the capital to invest in improving its product and distribution. Some of its investors are large managed security service providers that use Securonix as the back end of their MDR offering.
- Securonix has a very flexible deployment model. Through its partnership with Snowflake, Securonix will allow customers to bring their own Snowflake storage for the SIEM through a separate contract, which can reduce their cost.
- Autonomous threat hunting can be enabled based on threat research data from the Securonix Threat Labs.
According to IDC, critical success factors for SIEM platforms are:
- Easy deployment with quick-start guides to get up and running and readily available customer support options to deal with difficult issues: Securonix’s Next-Gen SIEM was built with an open and modular architecture so customers can choose the deployment option that best fits their SOC operating model. For example, through a partnership with Snowflake, Securonix allows customers to bring their own Snowflake storage for the SIEM through a separate contract, which also reduces costs.
- Pricing that allows customers to predict their costs without fear of overages and includes low-cost storage for logs that must be kept long term while remaining searchable: Securonix’s transparent pricing model enables customers to efficiently plan their deployment and estimate their potential cost savings. IDC says, “Securonix allows customers to bring their own key, bring their own cloud, or bring their own Snowflake. Pricing is based on a combination of identities, EPS, and data retention with identities as the primary factor. This and the Snowflake partnership may reduce costs for organizations that pay by ingestion today.”
- OOTB data connectors that are updated for them when there is a change at the data source: Securonix added more than 40 technology partners last year.
- As one of Snowflake’s go-to-market partners for its cybersecurity workload, customers can use Securonix SIEM capabilities on their Snowflake data cloud accounts.
- Securonix Investigate, powered by Polarity, is the industry’s first integrated SIEM, SOAR and Investigation offering that enables SOC teams to inspect threats identified by Securonix and take rapid action, reducing the meantime to respond by more than 50 percent and improving operational efficiency.
- Securonix’s cloud-to-cloud integration with Zscaler allows Securonix to query security event logs aggregated by Zscaler, which are stored in Snowflake for long-term retention and search. Joint customers can search this data on-demand from the Securonix Spotter UI for investigation and reporting needs. This enhances the functionality of Securonix Integration with Cybersecurity workload and allows customers to achieve advanced threat detection and response, without the cost and technical limitations of traditional SIEM solutions.
- New features on the road map that will alleviate analyst burnout from tedious investigation tasks, chasing false positives, and spending time on incidents that are less important: Securonix’s new feature sets include the recently added SOAR, Autonomous Threat Sweeper (ATS) capabilities, and the Extended Data Science Suite (XDS) in beta today, which allows threat hunters and detection engineers to use code in languages such as Python and Scala, embedded in Jupyter notebooks, to write new detection logic and hunt for threats.
SOURCE: IDC MarketScape: Worldwide SIEM 2022 Vendor Assessment, by Michelle Abraham, November 2022, IDC #US49029922
IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of ICT suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. The Capabilities score measures vendor product, go-to-market and business execution in the short-term. The Strategy score measures alignment of vendor strategies with customer requirements in a 3-5-year timeframe. Vendor market share is represented by the size of the circles.