News

SIEM Is Not Dead. It Just Stopped Moving Fast Enough.

  • None--securityboulevard.com
  • published date: 2026-03-19 00:00:00 UTC

None

<figure class="wp-block-image size-large"><a href="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM.png"><img fetchpriority="high" decoding="async" width="1024" height="683" src="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM-1024x683.png" alt="" class="wp-image-1637" srcset="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM-1024x683.png 1024w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM-300x200.png 300w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM-768x512.png 768w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px"></a></figure><p>I recently joined <a href="https://www.linkedin.com/in/timothypeacock/">Tim Peacock</a> and <a href="https://www.linkedin.com/in/chuvakin/">Anton Chuvakin</a> on the <a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep267-ai-soc-or-ai-in-a-soc-cutting-through-hype-pricing-models-and-siem-detection-efficacy-with-raffy-marty/">Google Cloud Security Podcast</a> to talk about SIEM, AI SOC, pricing, federated architecture, detection engineering, and why network telemetry is quietly becoming important again.</p><p>The short version is simple: SIEM is not dead. Calling it obsolete makes for good marketing, but it is not a serious thesis.</p><blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"> <p>The new wave of AI SOC, SIEM, and pipeline vendors is not proving SIEM is dead. It is proving SIEM vendors left too many gaps open for too long.</p> </blockquote><p>The recent wave of AI SOC startups, pipeline vendors, and new SIEM entrants is a response to real pain in the market. They are not replacing SIEM. They are capitalizing on the gaps incumbent vendors left open.</p><h2 class="wp-block-heading">TL;DR</h2><ul class="wp-block-list"> <li>SIEM is not dead. Vendors just left too many gaps open.</li> <li>AI SOC often exposes those gaps more than it replaces SIEM.</li> <li>Alert reduction alone will hide false negatives.</li> <li>The real fixes are better routing, detection, context, and workflows.</li> <li>Network telemetry still matters more than the market narrative suggests.</li> </ul><h2 class="wp-block-heading">The market is not replacing SIEM. It is rebuilding missing pieces.</h2><p>They say they will reduce alert volume, improve detections, make investigations faster, lower storage costs, and simplify operations. None of that is new. Those were always core parts of the SIEM vision.</p><p>That is why so many of these new entrants exist. They found real gaps:</p><ul class="wp-block-list"> <li>Pricing that became too hard to justify</li> <li>Architectures that did not scale as well as they should</li> <li>Detection stacks that still require too much manual work</li> <li>Default content that creates too much noise</li> <li>Workflows that remain painful for analysts and service providers</li> </ul><p>This is why I do not buy the “SIEM is over” narrative. If incumbents fix these gaps, many point solutions lose their edge quickly.</p><h2 class="wp-block-heading">AI SOC is mostly a patch on downstream pain</h2><p>The strongest short-term value in the AI SOC market is obvious: too many teams, especially MSSPs and down-market security providers, are drowning in alerts. A lot of environments are running with default content, light tuning, and limited budget for customization. Large enterprises can afford deep implementation and constant refinement. Many managed providers cannot.</p><blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"> <p>If a product makes the SOC quieter without improving coverage, you may not have solved the problem. You may have just converted visible false positives into invisible false negatives.</p> </blockquote><p>If a startup is solving alert overload by learning that the same service-account misconfiguration fires every morning at 8am and can safely be deprioritized, that is useful. But it is still a patch on bad upstream logic, and it often hides a second problem: false negatives. Once teams see fewer alerts, they assume the system got smarter. Sometimes it did. Sometimes it just got quieter. The real fix belongs closer to the detection layer, the correlation logic, the content, and the configuration model.</p><p>That is why I think a lot of the current AI SOC wave is temporary in its present form. Not temporary because the need goes away, but temporary because the best parts of that value will be absorbed elsewhere. Some of it should move back into the SIEM. Some of it should live in the detection engine. Some of it belongs in better onboarding, better rule tuning, better data handling, and better defaults.</p><p>There is still room for new winners here. But “we reduce alerts by 80%” is not a durable thesis by itself.</p><h2 class="wp-block-heading">The architecture debate is not centralized versus federated. It is about access patterns.</h2><p>In theory, pushing compute to where the data sits is attractive. In practice, the answer depends on access patterns.</p><p>Some data absolutely does not need to be centralized all the time. Endpoint system calls are a good example. You do not want to shovel every low-level signal into a central platform by default if you can process, summarize, or prioritize it earlier.</p><p>But the moment an analyst, agent, or investigation workflow needs context, enrichment, and cross-correlation, some centralization comes back. You need to connect what happened on the endpoint with what happened on the firewall, identity plane, SaaS layer, email stack, and elsewhere.</p><p>So the future is probably not pure centralized or pure federated. It is hybrid:</p><ul class="wp-block-list"> <li>Keep some data local or near-source</li> <li>Route and centralize the parts that matter</li> <li>Pull deeper context only when needed</li> <li>Optimize around how investigations actually happen</li> </ul><p>This is why I keep coming back to smart data routing. Most organizations do not need to send every piece of data to the same place forever. But they do need an architecture that knows when to summarize, when to correlate, and when to pull more detail back in.</p><h2 class="wp-block-heading">Data pipelines became the Trojan horse</h2><p>Vendors in this space positioned themselves as optimization and routing tools. Send your data here, normalize it, trim low-value volume, route it to the right storage tier, keep costs down, and retain optionality. In many environments, that solved a real problem.</p><p><a href="https://raffy.ch/blog/2025/12/03/the-trojan-horse-we-let-into-the-siem-kingdom/">But the strategic consequence is bigger than cost control.</a></p><p>Once a pipeline vendor owns your ingestion layer and your integrations, it becomes an abstraction layer between you and the SIEM. That makes the SIEM less sticky. At first the pipeline vendor only routes data. Then it adds search. Then it runs lightweight detections. Then it supports simple rules. At some point it starts to look suspiciously like a simple SIEM.</p><p>If someone else owns the data path, they eventually get a shot at owning more of the security brain.</p><h2 class="wp-block-heading">Pricing remains one of the category’s hardest unsolved problems</h2><p>Almost everyone agrees that SIEM pricing has been a problem. Much fewer people agree on what the right answer is.</p><p>The vendor reality is straightforward: data volume drives cost. The customer reality is equally straightforward: they hate unpredictability.</p><p>That tension gets even worse in the service-provider world. MSSPs and MSPs often sell packaged services, per-user offerings, or per-device contracts. Their customers do not want a fluctuating bill because log volume spiked this month. So the thing that is economically clean for the vendor can be operationally ugly for the buyer.</p><p>There is no perfect answer here. But the next generation of pricing models will need to do a better job of separating:</p><ul class="wp-block-list"> <li>Predictable commercial packaging</li> <li>Actual backend resource consumption</li> <li>Incentives for better data quality rather than more raw ingestion</li> </ul><p>The market has already started experimenting. Bring-your-own-storage, bring-your-own-compute, lower-cost data lakes, and more selective routing are all responses to the same pressure. Pricing is one of the core forces reshaping the market.</p><h2 class="wp-block-heading">Detection engineering still needs much more help from the platform</h2><p>Rules still need adaptation by environment. Thresholds differ. Data quality differs. Sources differ. Customer expectations differ. Generic content does not simply drop in and work.</p><p>What is surprising is how much low-hanging product work still remains. A modern platform should do far more to help users answer basic but critical questions:</p><ul class="wp-block-list"> <li>Is the data required for this detection even present?</li> <li>Is it configured in a way that can ever make this rule fire?</li> <li>Are there obvious gaps or mistakes in the source configuration?</li> <li>Which detections are silent because they are poorly mapped to the environment?</li> </ul><p>The more interesting direction, in my view, is not just better standalone rules. It is better context. Call it a context graph, an entity graph, a risk graph, or something else. The naming matters less than the function.</p><p>You want a living model of users, devices, applications, identities, behaviors, and risk signals. If the system knows that a user is coming from their normal IP, on a familiar device, through a known browser pattern, after strong authentication, that should shape how other events are interpreted. If all of those signals change at once, that should shape the response differently.</p><p>That kind of context is where detection quality meaningfully improves.</p><h2 class="wp-block-heading">Network telemetry is not “back,” but it is still critical</h2><p>I do not think this automatically means a major standalone NDR renaissance. But I do think many teams went too far in treating network telemetry as secondary once endpoint and application visibility improved.</p><p>An endpoint is still a single point of failure. If you lose visibility there, the network can still tell you a lot. It can help validate what else is happening. It can show you unmanaged systems, OT environments, choke points, and traffic patterns you will not otherwise see clearly.</p><p>This matters even more now because some organizations are reassessing where systems and data live. In parts of Europe, I am seeing more discussion around data sovereignty, political trust, private clouds, and selective moves back toward local or regional infrastructure. As architectures spread and governance constraints tighten, network visibility becomes more important again.</p><p>So no, I would not frame this as “throw away EDR and buy NDR.” That is the wrong lesson.</p><h2 class="wp-block-heading">What happens next</h2><blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"> <p>The real question is not whether SIEM survives. It is which vendors understand they are now selling data architecture, detection quality, analyst workflow, and decision support.</p> </blockquote><p>The SIEM market is heading into another rebuild cycle. Some AI SOC and pipeline startups will disappear, some will be absorbed, and some incumbents will finally fix what they should have fixed years ago. But the core need is not going away: security teams still need a place where signals come together, context gets built, detections improve, and response decisions get made.</p><p>That is still SIEM territory, even if the implementation looks very different from what we used to buy.</p><p><strong>?</strong> If you are building, buying, operating, or replacing SIEM, I’d love your input. I’m collecting market data at <a href="https://raffy.ch/SIEM">raffy.ch/SIEM</a>. Anyone can contribute, and everyone is welcome.</p><figure class="wp-block-image"><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep267-ai-soc-or-ai-in-a-soc-cutting-through-hype-pricing-models-and-siem-detection-efficacy-with-raffy-marty/"><img decoding="async" src="https://media.licdn.com/dms/image/v2/D5622AQHA3qlrTGbRyw/feedshare-shrink_1280/B56Zz3RqhrKcAM-/0/1773675130004?e=1775692800&amp;v=beta&amp;t=1N_Xdf4Fc1_KCg0sd7rknMXXre9P8X9AUnm9fSc8YA0" alt=""></a></figure><p>The post <a href="https://raffy.ch/blog/2026/03/19/siem-is-not-dead-it-just-stopped-moving-fast-enough/">SIEM Is Not Dead. It Just Stopped Moving Fast Enough.</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy &amp; Innovation with Raffy</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/03/siem-is-not-dead-it-just-stopped-moving-fast-enough/" data-a2a-title="SIEM Is Not Dead. It Just Stopped Moving Fast Enough."><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fsiem-is-not-dead-it-just-stopped-moving-fast-enough%2F&amp;linkname=SIEM%20Is%20Not%20Dead.%20It%20Just%20Stopped%20Moving%20Fast%20Enough." title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fsiem-is-not-dead-it-just-stopped-moving-fast-enough%2F&amp;linkname=SIEM%20Is%20Not%20Dead.%20It%20Just%20Stopped%20Moving%20Fast%20Enough." title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fsiem-is-not-dead-it-just-stopped-moving-fast-enough%2F&amp;linkname=SIEM%20Is%20Not%20Dead.%20It%20Just%20Stopped%20Moving%20Fast%20Enough." title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fsiem-is-not-dead-it-just-stopped-moving-fast-enough%2F&amp;linkname=SIEM%20Is%20Not%20Dead.%20It%20Just%20Stopped%20Moving%20Fast%20Enough." title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F03%2Fsiem-is-not-dead-it-just-stopped-moving-fast-enough%2F&amp;linkname=SIEM%20Is%20Not%20Dead.%20It%20Just%20Stopped%20Moving%20Fast%20Enough." title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy &amp;amp; Innovation with Raffy</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Raffael Marty">Raffael Marty</a>. Read the original post at: <a href="https://raffy.ch/blog/2026/03/19/siem-is-not-dead-it-just-stopped-moving-fast-enough/">https://raffy.ch/blog/2026/03/19/siem-is-not-dead-it-just-stopped-moving-fast-enough/</a> </p>