- Stars
- 14,110
- License
- Unknown
- Last commit
- 3 days ago
Best SIEM & Threat Detection Tools
Explore leading tools in the SIEM & Threat Detection category, including open-source options and SaaS products. Compare features, use cases, and find the best fit for your workflow.
5 open-source projects · 5 SaaS products
Top open-source SIEM & Threat Detection
These projects are active, self-hostable choices for knowledge management teams evaluating alternatives to SaaS tools.
- Stars
- 9,856
- License
- Unknown
- Last commit
- 3 days ago

OSSEC
Unified host-based intrusion detection, log analysis, and response platform
- Stars
- 4,946
- License
- Unknown
- Last commit
- 10 months ago

RedELK
Centralized SIEM for Red Teams to monitor and detect Blue Team activity
- Stars
- 2,600
- License
- BSD-3-Clause
- Last commit
- 22 days ago
- Stars
- 1,630
- License
- Apache-2.0
- Last commit
- 11 months ago
Wazuh delivers real‑time intrusion detection, log analysis, vulnerability scanning, and compliance reporting across on‑prem, cloud, and container environments with native Elastic Stack integration and automated response actions.
Popular SaaS Platforms to Replace
Understand the commercial incumbents teams migrate from and how many open-source alternatives exist for each product.
Elastic Security SIEM
Modern, cost-efficient SIEM with years of searchable data.
Exabeam
SIEM and UEBA for threat detection and response
IBM QRadar SIEM
Enterprise SIEM for real-time threat detection and compliance.
Microsoft Sentinel
Cloud-native SIEM and SOAR solution for intelligent security analytics and threat detection across enterprise environments
Sumo Logic Cloud SIEM
Cloud-native SIEM with real-time analytics and AI-guided investigation.
Elastic SIEM centralizes security data, enables hunting and detections aligned to MITRE ATT&CK, and links with the Elastic platform for investigation.
Frequently replaced when teams want private deployments and lower TCO.
Explore related categories
Browse neighbouring categories in Security to widen your evaluation.
- Application Security Testing (SAST/DAST/SCA)Static/dynamic analysis and dependency (SCA) scanning for application vulnerabilities.
- Compliance Automation & GRCAutomated controls, evidence collection and audits for SOC 2, ISO 27001, HIPAA and more.
- Container SecurityContainer image scanning and Kubernetes security tools for supply chain protection.
- Data Discovery & ClassificationSensitive data discovery, classification and privacy compliance across data stores.
- Identity & SSOIdentity and single sign-on (SSO) servers for authentication and user management.
- Secrets ManagementVaults and key management systems for secure storage of credentials and secrets.


