Event Monitoring (SIEM)

A SIEM solution has to fit you and your IT environment, and we can help you do that

  • Cloud vs. onPrem architecture
  • Feature comparisons
  • Integration and operation
  • Cost scenarios

A selection of our 100+ providers

Out value add:

We find the right provider for you in four steps – for free!


Specify requirements


Anonymous tender under Bosch brand


Transparent comparison of the best-fitting providers


Provider pitches and customer decision

1. We help you to specify your requirements

  • Requirement specification
  • Tendering procedure adapted to your processes or specifications
  • Provider comparisons

Start specification

2. CyberCompare tenders your requirements anonymously

  • Pre-selection based on our market insights
  • Leveraging the CyberCompare database
  • Identification of 5-6 relevant vendors
  • Tendering along the defined criteria

Understand our selection process

3. We provide you with an objective comparison of provider offerings

  • Consolidation of information and creation of objective comparability of offers
  • Comprehensive but clearly structured document with all the details you need for a selection
  • Selection of the favored providers by you – gladly with our recommendations

View example

4. You make the last decision with our support

  • Favourite providers present themselves in person to the customer
  • Documental support with important questions and details to be clarified
  • We accompany you until your purchasing department has carried out the final negotiation and the SIEM solution starts operationally

Book an appointment

Perspective from one of our experts

As SIEM continues to be one of the largest investments made by organizations, it will continue to be the center. Like the addition of UEBA to SIEM, SOAR is moving in the same direction.

Read the full interview

Matthias v. Knobelsdorf

Sales Director DACH for Cyberbit

Make an appointment and compare providers for SIEM solutions – especially for your case!

Contact our expert

Nehal Thakore

Bosch CyberCompare Country Head UK

+44 1895 838 918


Automatic checks of log files by a SIEM provide information about possible incidents in real time

SIEM platforms read log files from various sources and analyze the data for anomalies via correlations. SIEM platforms are often used in security. However, their use is not limited to security, but can also be used to analyze non-security data for anomalies, depending on the use case.

Challenges in the selection and implementation are:

  • Design of the solution (e.g. cloud-based vs. on-premises, internally operated vs. external managed service)
  • Selection of the individually relevant use cases
  • Selection of suitable log sources and determination of log volume (e.g. GB logs per day)
  • Operations concept after implementation (internal efforts,…)
  • In many cases a SIEM is integrated into a Security Operations Center (SOC)
    A security operations center can be operated both internally and externally. Here, trained experts analyze information, primarily from a SIEM, but also from other sources. In many cases, this service is required 24/7, which is why it is often outsourced to external providers. In defined levels, the experts also react actively in the event of an emergency and, for example, shut down critical systems and support forensic measures.

    SOC: Learn more

    Simeon Mussler

    We are happy to help you personally with the specification of your cybersecurity requirements:

    +44 1895 838 918

    Reach out now