Story image

Frost & Sullivan analyses FireEye's progression in SIEM space

22 Nov 2017

A Frost & Sullivan report names FireEye as one of the leaders in security incident and event management (SIEM) solutions for the company’s work on its FireEye Threat Analytics Platform (TAP).

The report, titled, ‘Security Information and Event Management Global Market Analysis, Forecast to 2021 – The Transition to SIEM 3.0,’ Frost & Sullivan estimated the 2016 market for SIEM was worth more than $1.78 billion – an increase of 8.2% on 2015.

SIEM vendors should also expect a 10.6% CAGR revenue growth rate from 2016-2021.

While traditional SIEM use cases include compliance, storage and forensic investigation, it is evolving to include many more features for threat response, comments Frost & Sullivan.

The analyst firm says that SIEM functions incorporate: bidirectional communication between SIEM and other security platforms, analytics that can reduce mean-time-to-detect and mean-time-to-respond; user behaviour analytics and network performance monitoring; rules violation; and analytics that can be applied to SIEM for redundancy.

The firm believes that FireEye’s relationship with its US-based firm Mandiant enhances both FireEye appliances and Mandiant’s threat hunting skills.

“FireEye has a unique approach to security because they are able to capture their insights from investigating breaches and design a SIEM solution based on frontline experience,” explains Christopher Kissel, senior analyst, Frost & Sullivan.

“The advantage of this approach came through in our report, as FireEye led in the User Behavior Analytics and threat hunting capabilities areas, key capabilities for any organization building a modern security program,” Kissel continues.

FireEye’s TAP was recognised for its user behaviour analytics. The company says this offering differentiates its features between platform providers.

Frost & Sullivan’s report also says that SIEM customers are burdened by implementation costs that can be between three to five times more than the initial software purchase costs.

Users can also spend more time maintaining their SIEM rather than using it.

FireEye says that its approach excels in cost and efficiency for managing security events, not maintenance.

“Customers can finally move beyond compliance and focus on protecting their organizations from the threats that matter,” comments FireEye CTO Grady Summers.

The report notes that FireEye has built an ‘extensive’ alliance partner network. FireEye says its roadmap includes security orchestration tool refinement and an app store to simplify the integration of cloud data sources.

Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
D-Link hooks up with Alexa and Assistant with new smart camera
The new camera is designed for outdoor use within a wireless smart home network.
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."