I’m proud to say that McAfee has received recognition from our customers with the 2018 Gartner Peer Insights Customers’ Choice for the Security Information and Event Management (SIEM). This is a recognition of high satisfaction from a number of reviews by verified end-user professionals. To ensure fair evaluation, Gartner maintains rigorous criteria for recognizing vendors with a high customer satisfaction rate.
If you don’t know much about our SIEM product — McAfee Enterprise Security Manager (ESM) — I encourage you to read a blog post published back in March (Is Your SOC Caught in the Slow Lane) for more details. ESM 11 is a modern SIEM, which we define as having an open and scalable data architecture, advanced analytical capabilities and the ability to quickly enrich and share relevant data.
And while Gartner has named McAfee a Leader in the “Magic Quadrant for Security Information and Event Management (SIEM)” over the past 7 years ¹, something that makes us proud, we are most appreciative of our customers who support our technologies and share their opinions through forums like Gartner Peer Insights. We believe voice and passion of our customers is critical to our success and motivates us each day.
McAfee’s corporate tag line is “Together is Power.” We are stronger when we work together – with customers and partners. Put another way, we recognize that organizations, and in this context, security operations teams, use a wide range of tools, which is why our Security Operations platform, which includes our SIEM, is strengthened by the many partners in our Security Innovation Alliance (SIA). Time to value is important when bringing new tools into customer environment. And while we know many companies want to reduce the number of tools used in their environment, research shows 25% of security events go unanalyzed. And 39% of cybersecurity organizations manually collect, process, and analyze external intelligence feeds. That means there is room for solutions like ESM, which can reduce complexity and improve critical security outcomes, such as mean time to detection and mean time to respond, and efficiently address critical compliance requirements.