With the right SIEM provider, you keep track of everything that happens in your IT environment

  • Price-performance ratio
  • References
  • Competence of the tester
  • Temporal and technical scope

A selection of our 100+ providers

Out value add:

We find the right provider for you in four steps – for free!



Specify requirements



Anonymous tender under Bosch brand



Transparent comparison of top 3 providers



Provider pitches and customer decision


1. We help you to specify your requirements

  • Requirement specification
  • E2E Tendering process
  • Provider validation

Start specification

2. CyberCompare tenders your requirements anonymously

  • Pre-selection based on our market insights
  • Leveraging the CyberCompare database
  • Identification of 5-6 relevant vendor
  • Tendering along the defined criteria

Understand our selection process

3. We provide you with an objective comparison of provider offerings

  • Consolidation of vendor information and preparation of a report with clear recommendations
  • Result presentation of the report
  • Pre-selection of 1-2 favours by customers

View example

4. You make the last decision with our support

  • Favourite providers present themselves in person to the customer
  • Customer makes his final decision
  • Accompaniment of interactions between customer and provider

Book an appointment

Perspective from one of our experts

As SIEM continues to be one of the largest investments made by organizations, it will continue to be the center. Like the addition of UEBA to SIEM, SOAR is moving in the same direction.

Read the full interview

Matthias v. Knobelsdorf

Sales Director DACH for Cyberbit


Make an appointment and compare provider for Penetration Test – especially for your case!

Contact our expert


Simeon Mussler

COO Bosch CyberCompare

+49 (0)711 811-19893


Automatic checks of log files by a SIEM provide information about possible incidents in real time

“SIEM platforms read log files from various sources and analyze the data for anomalies via correlations. SIEM platforms are often used in security. However, their use is not limited to security, but can also be used to analyze non-security data for anomalies, depending on the use case.
Challenges in the selection and implementation are
– Design of the solution (e.g. cloud-based vs. on-premises, internally operated vs. external managed service)
– Selection of the individually relevant use cases
– Selection of suitable log sources and determination of log volume (e.g. GB logs per day)
– Operations concept after implementation (internal efforts,…)”