IDC's SIEM, Exposure Management and Related Artificial Intelligence Technologies service covers security software and hardware products related to security information and event management (SIEM), exposure management platforms, and artificial intelligence (AI)–related technologies. Specific functions covered include device vulnerability management, SIEM, attack surface management, breach and attack simulation/security validation, and automated red teaming. This service is designed to create in-depth coverage of analytics tools used in the security operation centers and vulnerability management teams.
SIEM, Exposure Management and Related Artificial Intelligence Technologies
Related Links
Meet the Experts
Markets and Subjects Analyzed
- AI security and AI security assistants
- Device vulnerability management/exposure management
- SIEM
- Attack surface management
- Breach and attack simulation/security validation
Core Research
- Artificial Intelligence Security Use Cases
- Device Vulnerability Management Market Share and Forecast
- IDC MarketScape: SIEM
- SIEM Market Share and Forecast
- Attack Surface Management and Breach and Attack Simulation Market Forecast
- SIEM and Device Vulnerability Management User Surveys
- Market Analysis Perspective
In addition to the insight provided in this service, IDC may conduct research on specific topics or emerging market segments via research offerings that require additional IDC funding and client investment.
Key Questions Answered
- Who are the major players in the SIEM market?
- Who are the major players in the vulnerability/exposure management space?
- What is the size and market opportunity for SIEM solutions?
- What is the size and market opportunity for exposure management solutions?
- How is artificial intelligence improving exposure management and security operations?
- What do end users feel is important in SIEM and exposure management today?
- How are today's separate products becoming features in new combined offerings?
Companies Covered
- Amazon Web Services Inc.
- Armis Inc.
- AttackIQ, Inc.
- Axonius Solutions Ltd.
- Balbix Inc.
- Blumira Inc.
- Brinqa, LLC
- Censys Inc.
- Cisco Systems Inc.
- Claroty Ltd.
- CrowdStrike, Inc.
- Cyber Hunters Ltd.
- Cycognito Inc
- Cymulate Ltd.
- DAS Security BVBA
- Darktrace Ltd.
- Datadog, Inc.
- Devo Inc.
- Dragos Inc.
- Elastic NV
- Exabeam Inc.
- Fortinet, Inc.
- Fortra LLC
- Google LLC
- Graylog Inc.
- Gurucul Solutions LLC
- IBM
- Ivanti Software Inc.
- JupiterOne Inc.
- LogPoint A/S
- LogRhythm, Inc.
- Microsoft Corporation
- NSFOCUS Technologies Co. Ltd.
- NetWitness Corp.
- NopSec Inc.
- Nozomi Ltd.
- Nucleus Security Inc.
- OpenText Corporation
- Outpost24 AB
- Palo Alto Networks, Inc.
- Panther Labs Inc.
- Pentera Security Ltd.
- Picus Security Inc.
- Qianxin Technology Group Co., Ltd.
- Qualys Inc.
- Radiflow Ltd.
- Rapid7 LLC
- SafeBreach Ltd.
- Securonix, Inc.
- SentinelOne, Inc.
- ServiceNow, Inc.
- Skybox Security, Inc.
- Snowflake Inc.
- Splunk Inc.
- Sumo Logic, Inc.
- Tanium Inc.
- Tenable, Inc.
- Trellix Corp.
- Trend Micro Incorporated
- Venustech Group Inc.
- Vulcan Cyber Ltd.
- XM Cyber Ltd.
- Zoho Corporation Pvt. Ltd.
- Zscaler Inc.