<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Future of Tech and Security: Strategy &amp; Innovation with Raffy</title>
	<atom:link href="https://raffy.ch/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://raffy.ch/blog</link>
	<description>Insights at the intersection of cybersecurity, strategy, and innovation.</description>
	<lastBuildDate>Wed, 08 Apr 2026 10:46:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>AI SOC and SIEM Are Being Repriced</title>
		<link>https://raffy.ch/blog/2026/04/09/ai-soc-and-siem-are-being-repriced/</link>
					<comments>https://raffy.ch/blog/2026/04/09/ai-soc-and-siem-are-being-repriced/#respond</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 13:56:00 +0000</pubDate>
				<category><![CDATA[Security Market]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[financing]]></category>
		<category><![CDATA[security markets]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1664</guid>

					<description><![CDATA[<p>One of the more interesting messages going into RSA was not just that AI is reshaping security. It was that the market is changing what it rewards. I had the pleasure of attending the Piper Sandler investment day on Monday at RSA, one of my favorite events where I get to catch up with many [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2026/04/09/ai-soc-and-siem-are-being-repriced/">AI SOC and SIEM Are Being Repriced</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-large"><a href="https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-2-2026-04_56_09-PM.png"><img fetchpriority="high" decoding="async" width="1024" height="683" src="https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-2-2026-04_56_09-PM-1024x683.png" alt="" class="wp-image-1666" srcset="https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-2-2026-04_56_09-PM-1024x683.png 1024w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-2-2026-04_56_09-PM-300x200.png 300w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-2-2026-04_56_09-PM-768x512.png 768w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-2-2026-04_56_09-PM.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>One of the more interesting messages going into RSA was not just that AI is reshaping security. It was that the market is changing what it rewards. I had the pleasure of attending the Piper Sandler investment day on Monday at RSA, one of my favorite events where I get to catch up with many friends, meet new security leaders and get an update on the security market conditions.</p>



<p>The market for cyber security companies last year was easier: grow fast, expand inside the account, add modules, and let NRR do the talking. The new story looks different:</p>



<ul class="wp-block-list">
<li><strong>ARR</strong> growth expectations have come down from <code>50%</code> to <code><strong>30%</strong></code></li>



<li><strong>Gross margin</strong> expectations have moved up from <code>75%</code> to <code><strong>80%</strong></code></li>



<li><strong>NRR</strong> expectations have come down from <code>120%</code> to <code><strong>115%</strong></code></li>



<li><strong>GRR</strong> expectations have moved up from <code>88%</code> to <code><strong>92%</strong></code></li>



<li><strong>Burn multiple</strong> expectations have tightened from <code>1.5x</code> to <code><strong>&lt;1.0x</strong></code></li>
</ul>



<p>That may sound like a generic software market shift. I do not think it is. I think it has very specific implications for AI SOC and SIEM. More about that later.</p>



<h2 class="wp-block-heading">Capital markets changed first</h2>



<p>The broader market backdrop matters. Security is still one of the more attractive areas in software, but it is being valued inside a much harder capital markets environment. The IPO window remains narrow. Liquidity for scaled assets is limited. Growth is decelerating across software. And AI is compressing valuations by making forward revenue less credible and product durability more important. That combination changes the conversation from upside to survivability.</p>



<h2 class="wp-block-heading">Security is still attractive, but the bar is higher</h2>



<p>That is why the security market now feels bifurcated. On one side, it still benefits from strong structural demand: geopolitical uncertainty, expanding attack surfaces, and AI itself creating new categories of spend. On the other side, investors are becoming much less willing to underwrite broad TAM stories, multi-year expansion narratives, or “we will grow into the model” margin profiles. Security remains attractive, but the bar is higher.</p>



<h2 class="wp-block-heading">Private equity has a liquidity problem</h2>



<p>Private equity is caught in that tension as well. Large assets are staying private longer because the public market is not offering a clean exit path. That creates pressure on hold periods, return profiles, and liquidity planning. More firms will need to create liquidity through secondaries, continuation vehicles, and other forms of fund-to-fund reshuffling rather than relying on traditional exits. That is not a theoretical issue. It shapes what kinds of assets still look financeable, what kinds of stories buyers will believe, and how aggressively firms can keep marking winners.</p>



<h2 class="wp-block-heading">M&amp;A gets more strategic from here</h2>



<p>At the same time, strategic logic is getting stronger. Large-scale M&amp;A should remain active because buyers still want growth, but they increasingly want growth that is accretive, platform-relevant, and commercially durable. The market is likely to reward scaled platforms, integrated environments, and assets that can either deepen data advantages or simplify the stack. It is likely to punish products that still depend on expensive customer education, loose positioning, or heroic expansion assumptions.</p>



<h2 class="wp-block-heading">AI increases both risk and defensibility</h2>



<p>AI only sharpens that divide. In security, AI is both a disruption risk and a source of defensibility. It creates fear around older architectures and weaker product moats, but it also increases the value of proprietary telemetry, embedded distribution, and control points across the enterprise. The winners are less likely to be those with the loudest AI messaging and more likely to be those with the strongest combination of data, workflow ownership, and commercial leverage.</p>



<h2 class="wp-block-heading">Platformization is really about data gravity</h2>



<p>That is also why platformization matters so much right now. This is not just a consolidation story. It is a data gravity story. The vendor that sees more telemetry, sits in more workflows, and becomes harder to dislodge can improve models faster, distribute new capabilities faster, and defend retention more effectively. In a market that now cares more about GRR, margins, and burn discipline, that matters a lot.</p>



<h2 class="wp-block-heading">What this means for AI SOC and SIEM</h2>



<p>This is where the implications for SIEM and AI SOC come into focus. The category is seeing real pressure from both sides: incumbent platforms facing pricing and architectural questions, and newer entrants offering better workflows, AI-native interfaces, and more agentic operating models. But the long-term winners may not be the vendors with the sharpest demo. They may be the ones that combine durable retention, meaningful use-cases, security outcomes, and enough platform surface area to remain central as the security stack becomes more automated and more agent-driven.</p>



<p>Source: <a href="https://www.meetmax.com/upload/event_134353/Keynote%20Deck.pdf">Piper Sandler Keynote Deck</a></p><p>The post <a href="https://raffy.ch/blog/2026/04/09/ai-soc-and-siem-are-being-repriced/">AI SOC and SIEM Are Being Repriced</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2026/04/09/ai-soc-and-siem-are-being-repriced/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Is Becoming a Company Operating System Layer</title>
		<link>https://raffy.ch/blog/2026/04/06/ai-is-becoming-an-operating-system-layer/</link>
					<comments>https://raffy.ch/blog/2026/04/06/ai-is-becoming-an-operating-system-layer/#respond</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 13:18:00 +0000</pubDate>
				<category><![CDATA[Go To Market]]></category>
		<category><![CDATA[Investment]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[company operating system]]></category>
		<category><![CDATA[investment]]></category>
		<category><![CDATA[market dynamics]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1650</guid>

					<description><![CDATA[<p>During my engagements with various Private Equity and Venture Capital outlets, I see a clear shift. The questions that is showing up more and more in due diligence is no longer, “What is your AI strategy?” It is: “How far along are you in rebuilding the company around AI?” That is a different question. It [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2026/04/06/ai-is-becoming-an-operating-system-layer/">AI Is Becoming a Company Operating System Layer</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-large"><a href="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-19-2026-02_09_55-PM.png"><img decoding="async" width="1024" height="683" src="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-19-2026-02_09_55-PM-1024x683.png" alt="" class="wp-image-1653" srcset="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-19-2026-02_09_55-PM-1024x683.png 1024w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-19-2026-02_09_55-PM-300x200.png 300w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-19-2026-02_09_55-PM-768x512.png 768w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-19-2026-02_09_55-PM.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>During my engagements with various Private Equity and Venture Capital outlets, I see a clear shift. The questions that is showing up more and more in due diligence is no longer, “What is your AI strategy?”</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>It is: “How far along are you in rebuilding the company around AI?”</p>
</blockquote>



<p>That is a different question.</p>



<p>It applies to startups and incumbents alike. It applies to security companies, SaaS vendors, MSPs, and a lot of businesses outside those markets too. The point is no longer to add a few AI features, automate one workflow, or give employees access to a chatbot. The point is to rethink how the company actually operates.</p>



<h2 class="wp-block-heading">AI Should Sit Under Every Corporate Function</h2>



<p>The companies that will look strongest over the next few years are the ones treating AI as an operating system layer across the business.</p>



<p>That means product development, service delivery, sales and marketing, customer success, and finance and operations are all being reworked with AI in mind. Not as separate experiments, but as connected systems.</p>



<p>The important shift is not “where can we use AI?” It is “how should this function work if AI is built into the process from the start?”</p>



<p>That usually leads to a broader redesign. Workflows get compressed. Handoffs change. Data gets linked across teams. Software that used to just record tasks between humans starts becoming an orchestration layer between people and AI agents.</p>



<h2 class="wp-block-heading">AI on Top Is Not Enough</h2>



<p>Most companies are still treating AI like a feature layer. They add a copilot. They automate a few tasks. They run a few pilots in sales or support. Then they talk as if they have become an AI company. They have not.</p>



<p>If AI is going to matter as much as people claim, then it cannot live in isolated tools and side projects. It has to sit underneath the company as an operating layer. Product, service delivery, sales, marketing, customer success, finance, and operations all need to be rethought with AI built in from the start.</p>



<p>That is the real shift. Not AI as garnish. AI as infrastructure.</p>



<p>In practice, this means a company’s core operating logic can no longer live in forgotten decks, static docs, and tribal memory. Vision, mission, strategic priorities, ICP, and go-to-market motions need to be embedded into the AI layer itself so teams can interact with them in daily work (literally let them chat with these pieces of information via Slack!). The system should be able to explain the strategy, test whether execution matches it, and keep the company aligned as it changes. If that layer does not exist, most companies are still operating on fragments.</p>



<h2 class="wp-block-heading">This Is Now a Capital Question</h2>



<p>This is also why the conversation is changing in private equity and VC diligence.</p>



<p>We are not just looking for AI messaging anymore. We are looking for evidence that the operating model is changing. Is the company shipping faster? Is service delivery getting more leverage? Are teams linked better? Is software being used to orchestrate work between humans and AI agents rather than just record tasks? Is management actually rebuilding the business, or are they still presenting AI as an add-on?</p>



<p>Those questions now matter directly to competitiveness.</p>



<p>A company that keeps the old operating model and bolts AI on top will lose to one that rebuilds around it properly. The latter will move faster, learn faster, and eventually operate at a different level of efficiency.</p>



<h2 class="wp-block-heading">The Companies That Wait Will Pay For It</h2>



<p>I think this is becoming a funding imperative. </p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>Before raising capital, before pursuing a sale, and before the board forces the discussion, management teams need to be doing the hard work of redesigning the company around AI.</p>
</blockquote>



<p>Because the market is not going to wait for slow adopters to get comfortable. The companies that embrace AI as a true operating layer will look more scalable, more durable, and more investable. The ones that do not will increasingly look like they are running yesterday’s model in a market that has already moved on.</p><p>The post <a href="https://raffy.ch/blog/2026/04/06/ai-is-becoming-an-operating-system-layer/">AI Is Becoming a Company Operating System Layer</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2026/04/06/ai-is-becoming-an-operating-system-layer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>If AI Becomes the User, What Happens to the SIEM?</title>
		<link>https://raffy.ch/blog/2026/04/02/if-ai-becomes-the-user-what-happens-to-the-siem/</link>
					<comments>https://raffy.ch/blog/2026/04/02/if-ai-becomes-the-user-what-happens-to-the-siem/#comments</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 13:32:00 +0000</pubDate>
				<category><![CDATA[Security Information Management]]></category>
		<category><![CDATA[Security Market]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[siem market]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1658</guid>

					<description><![CDATA[<p>RSAC 2026 made one thing very clear to me: the market is moving fast, but it is still deeply confused. The big announcements from Google, Splunk, and Databricks all point in the same direction. Security operations are becoming more agentic, more API-driven, and more automated. But most of the category still looks crowded, early, and [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2026/04/02/if-ai-becomes-the-user-what-happens-to-the-siem/">If AI Becomes the User, What Happens to the SIEM?</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-large"><a href="https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-1-2026-11_26_10-AM.png"><img decoding="async" width="1024" height="683" src="https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-1-2026-11_26_10-AM-1024x683.png" alt="" class="wp-image-1661" srcset="https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-1-2026-11_26_10-AM-1024x683.png 1024w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-1-2026-11_26_10-AM-300x200.png 300w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-1-2026-11_26_10-AM-768x512.png 768w, https://raffy.ch/blog/wp-content/uploads/2026/04/ChatGPT-Image-Apr-1-2026-11_26_10-AM.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><strong>RSAC 2026</strong> made one thing very clear to me: the market is moving fast, but it is still <strong>deeply confused</strong>. The big announcements from <a href="https://cloud.google.com/solutions/security/agentic-soc">Google</a>, <a href="https://www.splunk.com/en_us/blog/security/from-reactive-to-agentic-with-enterprise-security-at-rsac-2026.html">Splunk</a>, and <a href="https://www.databricks.com/blog/databricks-announces-lakewatch-new-open-agentic-siem">Databricks</a> all point in the same direction. Security operations are becoming more agentic, more API-driven, and more automated. But most of the category still looks crowded, early, and only lightly differentiated.</p>



<p>The interesting part is not that everybody now has an AI story. It is where the pressure is landing: attack speed, active response, and the possibility that AI itself becomes the primary user of the security stack.</p>



<h2 class="wp-block-heading">TL;DR</h2>



<ul class="wp-block-list">
<li><strong>Attacks are now fast</strong> enough that human-speed response is no longer a sufficient default.</li>



<li>That will push the market toward active response, which is useful but also <strong>dangerous if the control logic</strong> is not deterministic enough.</li>



<li>Most AI SOC vendors still sound similar because many of them sit on top of existing SIEMs and alert streams <strong>rather than changing the underlying detection</strong> or data architecture.</li>



<li>The <strong>big SIEM vendors are moving</strong>, and one major EDR/SIEM vendor is expanding AI security into on-prem and sovereign environments.</li>



<li>If <strong>AI becomes the user</strong> of security products, the UI matters less, the API matters more, and the economics of expensive SIEM platforms get harder to defend.</li>
</ul>



<h2 class="wp-block-heading">Attacks are getting faster</h2>



<p>This is the part of the market I think people are still underestimating. CrowdStrike&#8217;s 2026 threat report says the average eCrime breakout time dropped to 29 minutes in 2025, and the fastest case it observed was 27 seconds. Databricks used its <a href="https://www.databricks.com/blog/databricks-announces-lakewatch-new-open-agentic-siem">Lakewatch announcement</a> to make a related point from the vulnerability side, citing research that mean time to exploit has fallen from 23.2 days in 2025 to 1.6 days in 2026.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>That changes what matters in the SOC. A lot of SIEM workflows still assume there is time to search, enrich, discuss, and decide. That model was already strained. It gets worse when attacks speed up and when the adversary is using AI to compress its own loop. Search still matters, but a search-centric operating model is not enough if the environment can be compromised end to end in under an hour.</p>
</blockquote>



<p>The obvious answer is more <strong>active response</strong>. The problem is that this is where things get dangerous. If teams start handing more containment and remediation decisions to AI before the systems are ready, we are going to see more self-inflicted outages. The market is moving there anyway, because the alternative is to keep defending at human speed against machine-speed attacks. SOAR was supposed to close part of that gap and clearly did not.</p>



<h2 class="wp-block-heading">AI SOC is still confusing and mostly sounds the same</h2>



<p>That was probably my main emotional reaction leaving RSAC: confusion. There were simply too many vendors with very similar messaging. RSAC says the conference had more than 600 exhibitors this year. I could not independently validate an exact count of 36 AI SOC vendors from public RSAC data, but &#8220;roughly three dozen&#8221; felt directionally right from the floor, and many of them sounded remarkably similar.</p>



<p>The common pitch was familiar: reduce alerts, triage faster, investigate faster, give the analyst a copilot, automate parts of response. Some of that is clearly useful. But a lot of it still feels like a layer on top of the existing SIEM rather than a rethink of the detection stack itself. If the AI mostly sits on top of alert streams coming out of a legacy backend, then it may improve analyst productivity without materially fixing false negatives, brittle detections, or poor data design upstream.</p>



<p>That is also why I do not think most of this market is really using LLMs in a deep way yet. In most cases, the models are being used for triage, recommendations, summarization, and analyst assistance. That is very different from using LLMs for real detection, broader SOC operations, or meaningful changes to the underlying architecture.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>For a more complete framework of where <a href="https://raffy.ch/blog/2026/02/03/the-gaps-that-created-the-new-wave-of-siem-and-ai-soc-vendors/">AI SOC and SIEM</a> should be heading, see <a href="https://raffy.ch/SIEM">raffy.ch/SIEM</a>.</p>
</blockquote>



<p>That is why so much of the category feels undifferentiated. The interfaces are different, the branding is different, and the demo flows are different, but the center of gravity often looks the same. The latest platform announcements only reinforce that point. If the platform owner adds the agentic layer too, the vendors sitting on top of Chronicle, Splunk, or similar platforms have a much harder moat to defend.</p>



<h2 class="wp-block-heading">The architecture is shifting</h2>



<p>By this point, the vendor movement is established. The more interesting question now is what it does to architecture. <a href="https://intelligencecommunitynews.com/sentinelone-expands-on-premises-offerings/">SentinelOne</a> adds another signal here by pushing more AI security capability into on-prem, sovereign, and air-gapped environments.</p>



<p>Put together, that points to a broader market shift. Storage matters more. Data routing matters more. Sovereignty and local control matter more. Cheap data lakes, strong analytics layers, and flexible orchestration matter more. Traditional SIEM UI matters less than it used to, and that matters not just for SIEM vendors but also for MDRs that differentiated by putting an AI layer on top of someone else&#8217;s backend.</p>



<p>That is also why Splunk&#8217;s cost model keeps coming back into the conversation. Splunk is powerful and mature, but if the agent becomes the main consumer of the system, customers start asking a different question: am I paying for the analytics engine, or am I paying for UI, workflow, and operating complexity that an agent increasingly does not care about?</p>



<h2 class="wp-block-heading">If AI becomes the user, the stack changes</h2>



<p>The most important implication may be economic, not just operational. Security products were built for human analysts. The value lived in the UI, the workflow, the search language, the dashboard, and the services needed to make all of that usable. But what happens if the real user becomes Claude Code, Codex, Gemini, or some internal agent instrumented across the entire security stack? <a href="https://danielmiessler.com/blog/the-great-transition">Daniel Miessler</a> has been arguing that companies and products increasingly become APIs. Security looks like one of the clearest versions of that shift.</p>



<p>In that world, every product starts to look more like an API than an application. That is exactly where the recent announcements are heading. <a href="https://github.com/refractionPOINT/lc-ai/tree/master/lc-soc">LimaCharlie&#8217;s new <code>lc-soc</code> release</a> is a concrete implementation of the same idea: an open-source &#8220;agentic SOC as code&#8221; where AI agents are coordinated through the cases system and D&amp;R rules, then deployed and versioned like infrastructure.</p>



<p>If AI becomes the primary user, the UI does not disappear, but it stops being the center of gravity. The agent does not care about your console. It cares about whether the data is accessible, whether the schema is consistent, whether the analytics layer is fast, whether the permissions model is clean, and whether the actions are safe to orchestrate.</p>



<p>That creates real pressure on expensive SIEM economics. If the agent can query multiple tools directly, the premium attached to a deeply monetized UI gets harder to justify. The market may move toward something simpler: cheap storage, a strong analytics layer, and an orchestration layer on top. That does not mean incumbents disappear. It means their value proposition changes. If AI becomes the user, the winners may be the vendors with the best APIs, control points, and data access model.</p>



<h2 class="wp-block-heading">Evals become part of the control layer</h2>



<p>The next problem is trust and determinism. Once you push AI beyond triage and recommendations and let it make or recommend more consequential changes, you need a way to keep the system reliable. That is where eval loops come in.</p>



<p>I heard Josh Saxe make this point at RSAC in the context of AI-first infrastructure management: if agents are going to make changes in live systems, you need strong evaluation around them to keep behavior bounded and repeatable enough to trust. I think the same logic applies directly to security operations. The market is moving toward active response, but the models themselves were not built around strict determinism.</p>



<p>That means the answer is not blind autonomy. It is more likely a layered system where adaptive AI sits inside clearer control boundaries, with evals, policy, and deterministic automation around it. Evals stop being an AI engineering detail and become part of the security control layer itself.</p><p>The post <a href="https://raffy.ch/blog/2026/04/02/if-ai-becomes-the-user-what-happens-to-the-siem/">If AI Becomes the User, What Happens to the SIEM?</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2026/04/02/if-ai-becomes-the-user-what-happens-to-the-siem/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How AI Will Reshape the MSP Market</title>
		<link>https://raffy.ch/blog/2026/03/27/how-ai-will-reshape-the-msp-market/</link>
					<comments>https://raffy.ch/blog/2026/03/27/how-ai-will-reshape-the-msp-market/#respond</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 13:00:00 +0000</pubDate>
				<category><![CDATA[Go To Market]]></category>
		<category><![CDATA[Security Market]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[msp]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1643</guid>

					<description><![CDATA[<p>“AI lowers execution cost, not accountability. SMBs outsource accountability.” It will affect SMB customers, the MSPs serving them, and the software vendors selling into the channel. Those are three different layers, and the impact on each one is different. SMBs Still Do Not Want To Own the Problem One concern is that AI makes knowledge [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2026/03/27/how-ai-will-reshape-the-msp-market/">How AI Will Reshape the MSP Market</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-large"><a href="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-02_22_59-PM.png"><img loading="lazy" decoding="async" width="1024" height="683" src="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-02_22_59-PM-1024x683.png" alt="" class="wp-image-1645" srcset="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-02_22_59-PM-1024x683.png 1024w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-02_22_59-PM-300x200.png 300w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-02_22_59-PM-768x512.png 768w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-02_22_59-PM.png 1536w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p class="has-text-align-center">“AI lowers execution cost, not accountability. SMBs outsource accountability.”</p>
</blockquote>



<p>It will affect SMB customers, the MSPs serving them, and the software vendors selling into the channel. Those are three different layers, and the impact on each one is different.</p>



<h2 class="wp-block-heading">SMBs Still Do Not Want To Own the Problem</h2>



<p>One concern is that AI makes knowledge cheaper and tooling easier, so SMBs may decide to manage more of their own IT.</p>



<p>I do not think that is the main outcome.</p>



<p>Most SMBs do not hire an MSP because they cannot access software or information. They hire an MSP because they do not want to own the problem. They want someone else to choose the tools, deploy them, keep them running, support users, stay current, and deal with issues when something breaks.</p>



<p>AI may make parts of IT easier. It does not remove the need for responsibility. That is why I think AI is unlikely to reduce the need for MSPs in any dramatic way.</p>



<h2 class="wp-block-heading">MSPs Get More Leverage</h2>



<p>Inside the MSP, the impact is more direct.</p>



<p>A lot of the work is repetitive: triage, ticket handling, investigation, internal knowledge lookup, and workflow coordination across too many systems. AI can improve all of that.</p>



<p>That does not mean the MSP becomes irrelevant. It means the MSP becomes more efficient.</p>



<p>A smaller team may be able to support more customers, resolve more issues, and operate with fewer manual steps. In security especially, where talent is scarce, that matters a lot. The near-term effect of AI on MSPs is not disintermediation. It is better leverage, better scale, and a different labor model.</p>



<h2 class="wp-block-heading">MSP Software Vendors Face the Real Reset</h2>



<p>The most interesting pressure may land on the MSP software vendors.</p>



<p>The issue is not whether they can add AI features. They all will. The real issue is whether they can get on the AI coding wagon fast enough and turn that into much faster product development.</p>



<p>AI-native development practices will increase the amount of software the market can produce. More gets built. Iteration cycles get shorter. Focused startups can come in faster. And incumbents lose some of the advantage that came from simply being large, embedded platforms.</p>



<p>That is where the moving-fast disadvantage shows up.</p>



<p>Big vendors carry legacy code, older architectures, complex customer requirements, and years of accumulated product sprawl. It is much harder for them to become truly AI-first development organizations than it is for a newer company starting fresh. There is a big difference between developers occasionally using AI and a company rebuilding product, engineering, testing, and delivery around AI-assisted speed.</p>



<p>If incumbents make that shift well, they will benefit enormously. If they do not, AI will not just improve their products. It will make newer competitors much more dangerous.</p>



<h2 class="wp-block-heading">What Changes From Here</h2>



<p>My current view is simple.</p>



<p>AI is probably a tailwind for MSP demand. It is clearly a lever for MSP efficiency. But it may be most disruptive to the software vendors serving the market, because it changes the speed of product development and lowers the barrier for new entrants.</p>



<p>MSPs are not going away. But the basis of competition is changing.</p>



<p></p><p>The post <a href="https://raffy.ch/blog/2026/03/27/how-ai-will-reshape-the-msp-market/">How AI Will Reshape the MSP Market</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2026/03/27/how-ai-will-reshape-the-msp-market/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SIEM Is Not Dead. It Just Stopped Moving Fast Enough.</title>
		<link>https://raffy.ch/blog/2026/03/19/siem-is-not-dead-it-just-stopped-moving-fast-enough/</link>
					<comments>https://raffy.ch/blog/2026/03/19/siem-is-not-dead-it-just-stopped-moving-fast-enough/#respond</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Thu, 19 Mar 2026 15:00:00 +0000</pubDate>
				<category><![CDATA[Security Information Management]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Security Market]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[siem market]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1628</guid>

					<description><![CDATA[<p>I recently joined Tim Peacock and Anton Chuvakin on the Google Cloud Security Podcast to talk about SIEM, AI SOC, pricing, federated architecture, detection engineering, and why network telemetry is quietly becoming important again. The short version is simple: SIEM is not dead. Calling it obsolete makes for good marketing, but it is not a [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2026/03/19/siem-is-not-dead-it-just-stopped-moving-fast-enough/">SIEM Is Not Dead. It Just Stopped Moving Fast Enough.</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-large"><a href="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM.png"><img loading="lazy" decoding="async" width="1024" height="683" src="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM-1024x683.png" alt="" class="wp-image-1637" srcset="https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM-1024x683.png 1024w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM-300x200.png 300w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM-768x512.png 768w, https://raffy.ch/blog/wp-content/uploads/2026/03/ChatGPT-Image-Mar-18-2026-01_54_57-PM.png 1536w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>I recently joined <a href="https://www.linkedin.com/in/timothypeacock/">Tim Peacock</a> and <a href="https://www.linkedin.com/in/chuvakin/">Anton Chuvakin</a> on the <a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep267-ai-soc-or-ai-in-a-soc-cutting-through-hype-pricing-models-and-siem-detection-efficacy-with-raffy-marty/">Google Cloud Security Podcast</a> to talk about SIEM, AI SOC, pricing, federated architecture, detection engineering, and why network telemetry is quietly becoming important again.</p>



<p>The short version is simple: SIEM is not dead. Calling it obsolete makes for good marketing, but it is not a serious thesis.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>The new wave of AI SOC, SIEM, and pipeline vendors is not proving SIEM is dead. It is proving SIEM vendors left too many gaps open for too long.</p>
</blockquote>



<p>The recent wave of AI SOC startups, pipeline vendors, and new SIEM entrants is a response to real pain in the market. They are not replacing SIEM. They are capitalizing on the gaps incumbent vendors left open.</p>



<h2 class="wp-block-heading">TL;DR</h2>



<ul class="wp-block-list">
<li>SIEM is not dead. Vendors just left too many gaps open.</li>



<li>AI SOC often exposes those gaps more than it replaces SIEM.</li>



<li>Alert reduction alone will hide false negatives.</li>



<li>The real fixes are better routing, detection, context, and workflows.</li>



<li>Network telemetry still matters more than the market narrative suggests.</li>
</ul>



<h2 class="wp-block-heading">The market is not replacing SIEM. It is rebuilding missing pieces.</h2>



<p>They say they will reduce alert volume, improve detections, make investigations faster, lower storage costs, and simplify operations. None of that is new. Those were always core parts of the SIEM vision.</p>



<p>That is why so many of these new entrants exist. They found real gaps:</p>



<ul class="wp-block-list">
<li>Pricing that became too hard to justify</li>



<li>Architectures that did not scale as well as they should</li>



<li>Detection stacks that still require too much manual work</li>



<li>Default content that creates too much noise</li>



<li>Workflows that remain painful for analysts and service providers</li>
</ul>



<p>This is why I do not buy the “SIEM is over” narrative. If incumbents fix these gaps, many point solutions lose their edge quickly.</p>



<h2 class="wp-block-heading">AI SOC is mostly a patch on downstream pain</h2>



<p>The strongest short-term value in the AI SOC market is obvious: too many teams, especially MSSPs and down-market security providers, are drowning in alerts. A lot of environments are running with default content, light tuning, and limited budget for customization. Large enterprises can afford deep implementation and constant refinement. Many managed providers cannot.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>If a product makes the SOC quieter without improving coverage, you may not have solved the problem. You may have just converted visible false positives into invisible false negatives.</p>
</blockquote>



<p>If a startup is solving alert overload by learning that the same service-account misconfiguration fires every morning at 8am and can safely be deprioritized, that is useful. But it is still a patch on bad upstream logic, and it often hides a second problem: false negatives. Once teams see fewer alerts, they assume the system got smarter. Sometimes it did. Sometimes it just got quieter. The real fix belongs closer to the detection layer, the correlation logic, the content, and the configuration model.</p>



<p>That is why I think a lot of the current AI SOC wave is temporary in its present form. Not temporary because the need goes away, but temporary because the best parts of that value will be absorbed elsewhere. Some of it should move back into the SIEM. Some of it should live in the detection engine. Some of it belongs in better onboarding, better rule tuning, better data handling, and better defaults.</p>



<p>There is still room for new winners here. But “we reduce alerts by 80%” is not a durable thesis by itself.</p>



<h2 class="wp-block-heading">The architecture debate is not centralized versus federated. It is about access patterns.</h2>



<p>In theory, pushing compute to where the data sits is attractive. In practice, the answer depends on access patterns.</p>



<p>Some data absolutely does not need to be centralized all the time. Endpoint system calls are a good example. You do not want to shovel every low-level signal into a central platform by default if you can process, summarize, or prioritize it earlier.</p>



<p>But the moment an analyst, agent, or investigation workflow needs context, enrichment, and cross-correlation, some centralization comes back. You need to connect what happened on the endpoint with what happened on the firewall, identity plane, SaaS layer, email stack, and elsewhere.</p>



<p>So the future is probably not pure centralized or pure federated. It is hybrid:</p>



<ul class="wp-block-list">
<li>Keep some data local or near-source</li>



<li>Route and centralize the parts that matter</li>



<li>Pull deeper context only when needed</li>



<li>Optimize around how investigations actually happen</li>
</ul>



<p>This is why I keep coming back to smart data routing. Most organizations do not need to send every piece of data to the same place forever. But they do need an architecture that knows when to summarize, when to correlate, and when to pull more detail back in.</p>



<h2 class="wp-block-heading">Data pipelines became the Trojan horse</h2>



<p>Vendors in this space positioned themselves as optimization and routing tools. Send your data here, normalize it, trim low-value volume, route it to the right storage tier, keep costs down, and retain optionality. In many environments, that solved a real problem.</p>



<p><a href="https://raffy.ch/blog/2025/12/03/the-trojan-horse-we-let-into-the-siem-kingdom/">But the strategic consequence is bigger than cost control.</a></p>



<p>Once a pipeline vendor owns your ingestion layer and your integrations, it becomes an abstraction layer between you and the SIEM. That makes the SIEM less sticky. At first the pipeline vendor only routes data. Then it adds search. Then it runs lightweight detections. Then it supports simple rules. At some point it starts to look suspiciously like a simple SIEM.</p>



<p>If someone else owns the data path, they eventually get a shot at owning more of the security brain.</p>



<h2 class="wp-block-heading">Pricing remains one of the category’s hardest unsolved problems</h2>



<p>Almost everyone agrees that SIEM pricing has been a problem. Much fewer people agree on what the right answer is.</p>



<p>The vendor reality is straightforward: data volume drives cost. The customer reality is equally straightforward: they hate unpredictability.</p>



<p>That tension gets even worse in the service-provider world. MSSPs and MSPs often sell packaged services, per-user offerings, or per-device contracts. Their customers do not want a fluctuating bill because log volume spiked this month. So the thing that is economically clean for the vendor can be operationally ugly for the buyer.</p>



<p>There is no perfect answer here. But the next generation of pricing models will need to do a better job of separating:</p>



<ul class="wp-block-list">
<li>Predictable commercial packaging</li>



<li>Actual backend resource consumption</li>



<li>Incentives for better data quality rather than more raw ingestion</li>
</ul>



<p>The market has already started experimenting. Bring-your-own-storage, bring-your-own-compute, lower-cost data lakes, and more selective routing are all responses to the same pressure. Pricing is one of the core forces reshaping the market.</p>



<h2 class="wp-block-heading">Detection engineering still needs much more help from the platform</h2>



<p>Rules still need adaptation by environment. Thresholds differ. Data quality differs. Sources differ. Customer expectations differ. Generic content does not simply drop in and work.</p>



<p>What is surprising is how much low-hanging product work still remains. A modern platform should do far more to help users answer basic but critical questions:</p>



<ul class="wp-block-list">
<li>Is the data required for this detection even present?</li>



<li>Is it configured in a way that can ever make this rule fire?</li>



<li>Are there obvious gaps or mistakes in the source configuration?</li>



<li>Which detections are silent because they are poorly mapped to the environment?</li>
</ul>



<p>The more interesting direction, in my view, is not just better standalone rules. It is better context. Call it a context graph, an entity graph, a risk graph, or something else. The naming matters less than the function.</p>



<p>You want a living model of users, devices, applications, identities, behaviors, and risk signals. If the system knows that a user is coming from their normal IP, on a familiar device, through a known browser pattern, after strong authentication, that should shape how other events are interpreted. If all of those signals change at once, that should shape the response differently.</p>



<p>That kind of context is where detection quality meaningfully improves.</p>



<h2 class="wp-block-heading">Network telemetry is not “back,” but it is still critical</h2>



<p>I do not think this automatically means a major standalone NDR renaissance. But I do think many teams went too far in treating network telemetry as secondary once endpoint and application visibility improved.</p>



<p>An endpoint is still a single point of failure. If you lose visibility there, the network can still tell you a lot. It can help validate what else is happening. It can show you unmanaged systems, OT environments, choke points, and traffic patterns you will not otherwise see clearly.</p>



<p>This matters even more now because some organizations are reassessing where systems and data live. In parts of Europe, I am seeing more discussion around data sovereignty, political trust, private clouds, and selective moves back toward local or regional infrastructure. As architectures spread and governance constraints tighten, network visibility becomes more important again.</p>



<p>So no, I would not frame this as “throw away EDR and buy NDR.” That is the wrong lesson.</p>



<h2 class="wp-block-heading">What happens next</h2>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>The real question is not whether SIEM survives. It is which vendors understand they are now selling data architecture, detection quality, analyst workflow, and decision support.</p>
</blockquote>



<p>The SIEM market is heading into another rebuild cycle. Some AI SOC and pipeline startups will disappear, some will be absorbed, and some incumbents will finally fix what they should have fixed years ago. But the core need is not going away: security teams still need a place where signals come together, context gets built, detections improve, and response decisions get made.</p>



<p>That is still SIEM territory, even if the implementation looks very different from what we used to buy.</p>



<p><strong>?</strong> If you are building, buying, operating, or replacing SIEM, I’d love your input. I’m collecting market data at <a href="https://raffy.ch/SIEM">raffy.ch/SIEM</a>. Anyone can contribute, and everyone is welcome.</p>



<figure class="wp-block-image"><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep267-ai-soc-or-ai-in-a-soc-cutting-through-hype-pricing-models-and-siem-detection-efficacy-with-raffy-marty/"><img decoding="async" src="https://media.licdn.com/dms/image/v2/D5622AQHA3qlrTGbRyw/feedshare-shrink_1280/B56Zz3RqhrKcAM-/0/1773675130004?e=1775692800&amp;v=beta&amp;t=1N_Xdf4Fc1_KCg0sd7rknMXXre9P8X9AUnm9fSc8YA0" alt=""/></a></figure><p>The post <a href="https://raffy.ch/blog/2026/03/19/siem-is-not-dead-it-just-stopped-moving-fast-enough/">SIEM Is Not Dead. It Just Stopped Moving Fast Enough.</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2026/03/19/siem-is-not-dead-it-just-stopped-moving-fast-enough/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The SIEM Maturity Framework: A Practical Scoring Tool for Security Analytics Platforms</title>
		<link>https://raffy.ch/blog/2026/02/11/the-siem-maturity-framework-workbook-v1-0-a-practical-scoring-tool-for-security-analytics-platforms/</link>
					<comments>https://raffy.ch/blog/2026/02/11/the-siem-maturity-framework-workbook-v1-0-a-practical-scoring-tool-for-security-analytics-platforms/#respond</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Wed, 11 Feb 2026 21:03:18 +0000</pubDate>
				<category><![CDATA[Log Analysis]]></category>
		<category><![CDATA[Security Information Management]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Security Market]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1594</guid>

					<description><![CDATA[<p>Update: Instead of an Excel spreadsheet, here is an online app that you can use. I&#8217;d love for you to submit your own ratings so we can crowd-source some of these answers! Over the last few weeks I published a post on the architectural and operational gaps that created the new wave of SIEM and [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2026/02/11/the-siem-maturity-framework-workbook-v1-0-a-practical-scoring-tool-for-security-analytics-platforms/">The SIEM Maturity Framework: A Practical Scoring Tool for Security Analytics Platforms</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-large"><a href="https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-11-2026-02_58_23-PM.png"><img loading="lazy" decoding="async" width="1024" height="683" src="https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-11-2026-02_58_23-PM-1024x683.png" alt="" class="wp-image-1600" srcset="https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-11-2026-02_58_23-PM-1024x683.png 1024w, https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-11-2026-02_58_23-PM-300x200.png 300w, https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-11-2026-02_58_23-PM-768x512.png 768w, https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-11-2026-02_58_23-PM.png 1536w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>Update: Instead of an Excel spreadsheet, here is an <a href="https://raffy.ch/SIEM" title="">online app</a> that you can use. I&#8217;d love for you to submit your own ratings so we can crowd-source some of these answers!</p>
</blockquote>



<p>Over the last few weeks I published a post on the <a href="https://raffy.ch/blog/2026/02/03/the-gaps-that-created-the-new-wave-of-siem-and-ai-soc-vendors/">architectural and operational gaps that created the new wave of SIEM and AI SOC</a> vendors. A bunch of people asked the same follow-up question:</p>



<p>“Ok, but how do I evaluate vendors consistently without falling back into feature checklists and marketing claims?”</p>



<p>So I turned the framework into a practical scoring workbook (and now a small <a href="https://raffy.ch/SIEM" title="">Web application</a>) you can use to rate a platform across the dimensions I described in the post. The workbook allows you to rate each category from 1 to 5 and I spent some time defining what a 1 versus a 5 means in each of the categories. I give you an example for the &#8220;<strong>Data Pipeline Optimization</strong>&#8221; category. Here are the 5 maturity steps:</p>



<ul class="wp-block-list">
<li>1 | Static ingestion pipelines that forward all data to a central store.</li>



<li>2 | Basic filtering or routing based on source or log type.</li>



<li>3 | Conditional enrichment and routing based on use case or predefined alerts/rules.</li>



<li>4 | Dynamic pipelines that adapt sampling, enrichment, and routing based on downstream value.</li>



<li>5 | Continuously optimized pipelines driven by feedback loops from detections, cost, and analyst outcomes.</li>
</ul>



<p>I hope the breakdown into these 5 values helps going through a more &#8216;objective&#8217; assessment of these platforms and also shows what excellent looks like in each of these categories.</p>



<h3 class="wp-block-heading">What this is</h3>



<p>The <strong>Security Analytics Platforms – Maturity Framework</strong> is an architecture-first tool to evaluate security platforms across <strong>architectural, detection, and operational</strong> dimensions. It is designed to help you compare systems based on <strong>their advanced capabilities </strong>that are desperately needed to deliver a SIEM experience that is adequate for 2026..</p>



<h3 class="wp-block-heading">What this is not</h3>



<p>This is not a vendor ranking, a feature checklist, or a replacement for hands-on testing. It&#8217;s also NOT an RFP template. As I indicated in my previous blog where I outlined all the different categories, the table stakes are not mentioned or evaluated. </p>



<h3 class="wp-block-heading">How to use it in 10 minutes</h3>



<ol class="wp-block-list">
<li>Add one vendor per row in the rating sheet.</li>



<li>Score each topic based on current behavior, not roadmap promises. </li>



<li>Review category roll-ups and the heatmap to spot structural gaps.</li>
</ol>



<p>A key insight: <strong>large gaps between category scores often matter more than the overall score.</strong></p>



<h3 class="wp-block-heading">Use the Web App</h3>



<p>Click on the image to launch the app&#8230;</p>


<p><a href="https://raffy.ch/SIEM/"><img decoding="async" class="wp-image-1618" src="https://raffy.ch/blog/wp-content/uploads/2026/02/image-2.png" width="500" alt="Application Launch" srcset="https://raffy.ch/blog/wp-content/uploads/2026/02/image-2.png 696w, https://raffy.ch/blog/wp-content/uploads/2026/02/image-2-300x244.png 300w" sizes="(max-width: 696px) 100vw, 696px" /></a></p>


<h3 class="wp-block-heading">Download</h3>



<div class="wp-block-file"><strong>Workbook (v1.0)</strong> &#8211; <a id="wp-block-file--media-f0b67057-0e04-4c0a-9970-693ee493a144" href="https://raffy.ch/blog/wp-content/uploads/2026/02/SIEM_Ratings_Framework.xlsm">SIEM_Ratings_Framework</a> &#8211; Last updated: 2026-02-11
</div>



<h3 class="wp-block-heading">Why I’m releasing this</h3>



<p>Security analytics is in the middle of a reset. Incumbent SIEMs are being re-architected, new SIEM startups are emerging, and AI SOC vendors are rewriting parts of the operating model. End users and investors need a way to evaluate these platforms objectively, beyond feature checklists and marketing claims. This workbook is my attempt to make that evaluation repeatable, comparable, and anchored in the areas that I see missing or deficient in the incumbent SIEM space.</p>



<h3 class="wp-block-heading">If you use it, I’d love your feedback</h3>



<p>If you score a platform with it, use the <a href="https://raffy.ch/SIEM" title="">Web app</a> and submit your rating. You need to log in via Github or Google so I don&#8217;t get flooded with fake entries. I&#8217;d love to crowdsource an assessment of all the SIEM and AI SOC vendors out there. Can we do it?</p><p>The post <a href="https://raffy.ch/blog/2026/02/11/the-siem-maturity-framework-workbook-v1-0-a-practical-scoring-tool-for-security-analytics-platforms/">The SIEM Maturity Framework: A Practical Scoring Tool for Security Analytics Platforms</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2026/02/11/the-siem-maturity-framework-workbook-v1-0-a-practical-scoring-tool-for-security-analytics-platforms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Gaps That Created the New Wave of SIEM and AI SOC Vendors</title>
		<link>https://raffy.ch/blog/2026/02/03/the-gaps-that-created-the-new-wave-of-siem-and-ai-soc-vendors/</link>
					<comments>https://raffy.ch/blog/2026/02/03/the-gaps-that-created-the-new-wave-of-siem-and-ai-soc-vendors/#comments</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Tue, 03 Feb 2026 15:59:02 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Security Information Management]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Security Market]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[siem market]]></category>
		<category><![CDATA[soc]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1584</guid>

					<description><![CDATA[<p>Update (2026-02): I released the SIEM Maturity Framework Workbook (v1.0) that turns this post into a practical scoring tool. I have been talking to a few AI SOC and new SIEM market entrants over the past few weeks. I have voiced some opinions in previous posts but have now started to capture a list of [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2026/02/03/the-gaps-that-created-the-new-wave-of-siem-and-ai-soc-vendors/">The Gaps That Created the New Wave of SIEM and AI SOC Vendors</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-full"><a href="https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-3-2026-09_58_04-AM.jpg"><img loading="lazy" decoding="async" width="800" height="533" src="https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-3-2026-09_58_04-AM.jpg" alt="" class="wp-image-1591" srcset="https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-3-2026-09_58_04-AM.jpg 800w, https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-3-2026-09_58_04-AM-300x200.jpg 300w, https://raffy.ch/blog/wp-content/uploads/2026/02/ChatGPT-Image-Feb-3-2026-09_58_04-AM-768x512.jpg 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></a></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>Update (2026-02):</strong> I released the <strong><a href="https://raffy.ch/blog/2026/02/11/the-siem-maturity-framework-workbook-v1-0-a-practical-scoring-tool-for-security-analytics-platforms/">SIEM Maturity Framework Workbook (v1.0)</a></strong> that turns this post into a practical scoring tool.</p>
</blockquote>



<p>I have been talking to a few AI SOC and new <a href="https://raffy.ch/blog/2025/12/17/why-venture-capital-is-betting-against-traditional-siems/">SIEM market</a> entrants over the past few weeks. I have voiced some opinions in <a href="https://raffy.ch/blog/2026/01/16/how-ai-impacts-the-cyber-market-and-the-future-of-siem/">previous posts</a> but have now started to capture a list of features that I believe represent the openings existing SIEM players have created in the market for these new vendors to emerge.</p>



<p>Before I outline what I think those features are, let me be clear: this is my list. I am aware that existing SIEM vendors will claim that they already do many of these things. All I will say is this: market churn and capital flow suggest that these capabilities are either not as mature or not as integrated as claimed.</p>



<p>And to the AI SOC companies and investors: be careful about the short-term problems your investments are solving. Yes, there is real traction with MSSPs that are overloaded with false positives. And yes, many will gladly pay to reduce alert workload by 80%. But in many cases, these problems are being addressed superficially. Make sure you audit the underlying approaches and verify that the foundational infrastructure is sound. Solving this problem on top of an existing detection infrastructure doesn&#8217;t solve the problem at the core, which is the detections themselves. We need to fix those with some of the suggestions below to not needing a top-layer, alert reducer. </p>



<p>Without further ado, here are the items I am tracking. I welcome other opinions and additions to the list (no guarantee I will include them). Over the coming weeks, I will also try to rate some of the players across these categories to enable comparison. I could use help with that. Ping me.</p>



<h3 class="wp-block-heading">A. DATA &amp; CONTROL PLANE ARCHITECTURE</h3>



<ul class="wp-block-list">
<li><strong>Federation</strong> &#8211; The ability to query and reason over data where it lives, without forced centralization.<br />(Another post following here at some point about the limitations of federation).</li>



<li><strong>Data Pipeline</strong> <strong>Optimization</strong> &#8211; Dynamic ingestion pipelines that enrich, route, sample, and filter data based on use case, risk, and downstream value. Not static “send everything to the lake.”</li>



<li><strong>Data Awareness</strong> &#8211; Understanding what data exists, what is missing, and what has silently degraded. The system must continuously reason about its own observability.</li>



<li><strong>Performance as a First-Class Constraint</strong> &#8211; Fast joins and low-latency queries across all relevant data. Real-time rule execution at scale. This is not about basic scalability, but about maintaining predictable performance as rule count and complexity increase, without simply throwing more compute at the problem.</li>



<li><strong>Modern AI Integration</strong> &#8211; The ability to integrate with emerging architectural patterns and frameworks, including MCP servers, vector stores, and related systems.</li>
</ul>



<h3 class="wp-block-heading">B. DETECTION &amp; LEARNING SYSTEMS</h3>



<ul class="wp-block-list">
<li><strong>Hypothesis-Driven Hunting</strong> &#8211; Hunting should start with explicit hypotheses, not ad-hoc queries. These hypotheses should evolve, fork, and self-update based on outcomes. Agents swarms anyone?</li>



<li><strong>Automated Detection Tuning (Closed Loop)</strong> &#8211; Detections must evaluate their precision and recall over time. False positives and false negatives are signals. Humans stay in the loop, but are not the tuning engine. This also helps separate the detection engineering from the tuning that should be done by analysts.</li>



<li><strong>Environment-Adaptive Detections</strong> &#8211; Rules and models must adapt automatically to the specific environment, business processes, and user behavior and analyst feedback. Generic detections are table stakes.</li>



<li><strong>Detection Lineage and Memory</strong> &#8211; The system must remember why a detection exists, how it has changed, and what outcomes it has historically produced.</li>
</ul>



<h3 class="wp-block-heading">C. ENTITY-CENTRIC RISK &amp; CONTEXT</h3>



<ul class="wp-block-list">
<li><strong>Asset Awareness </strong>&#8211; Effective protection and detection start with understanding what is being protected. Entity visibility is foundational: who owns this entity, what does it do, and which business processes does it support?</li>



<li><strong>Real-Time Entity Risk Scoring</strong> &#8211; Each entity has a continuously updated risk score driven by behavior, exposure, and contextual signals.</li>



<li><strong>Entity Risk Context</strong> &#8211; Risk is not a number. It is a set of properties that help explain the risk and provide context for decision making.</li>



<li><strong>Business Context Integration</strong> &#8211; Entities must be tied to business processes, ownership, and criticality, and this context must inform alert generation and prioritization. Some people have started calling this the <a href="https://foundationcapital.com/context-graphs-one-month-in/">Context Graph</a>. </li>
</ul>



<h3 class="wp-block-heading">D. OPERATIONAL REALITY (SOC, MSSP, ENFORCEMENT)</h3>



<ul class="wp-block-list">
<li><strong>Simple Query</strong> <strong>Interface</strong>: Support for both natural language and structured query languages (such as KQL). Analysts need both.</li>



<li><strong>Alert Triage Automation</strong> &#8211; Using &#8216;advanced&#8217; context to tune detections. Ideally we have business context available to continuously improve our detections.</li>



<li><strong>Blindspot Detection</strong> &#8211; The system must actively identify where detections cannot exist due to missing or degraded logs or logging configurations. This includes making sure that log sources are actually staying up and keep reporting what they have to.</li>



<li><strong>Real-Time Readiness for Enforcement</strong> &#8211; We need our systems to become preventative. Therefore, its risk model must operate in near real time. Attackers are acting too fast.</li>
</ul>



<h2 class="wp-block-heading">A Few Additional Comments for Context</h2>



<p>This is not meant to be a SIEM RFP. I am intentionally not listing table-stakes capabilities such as basic scalability, data source support, or baseline detection depth.</p>



<p>This list is less about features than about where intelligence and control actually live in the system. I am also not being prescriptive on how these features are built. Many of them can benefit from AI / LLM / ML approaches and, in fact, should be using them.</p>



<p>Look at the list, then look at your AI SOC platform of choice. How much of the above does it truly cover?</p>



<p>If you are evaluating an AI SOC platform and most of its value proposition lives above alerts rather than below them, you should be skeptical.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>Update (2026-02):</strong> I released the <strong><a href="https://raffy.ch/blog/2026/02/11/the-siem-maturity-framework-workbook-v1-0-a-practical-scoring-tool-for-security-analytics-platforms/">SIEM Maturity Framework Workbook (v1.0)</a></strong> that turns this post into a practical scoring tool.</p>
</blockquote><p>The post <a href="https://raffy.ch/blog/2026/02/03/the-gaps-that-created-the-new-wave-of-siem-and-ai-soc-vendors/">The Gaps That Created the New Wave of SIEM and AI SOC Vendors</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2026/02/03/the-gaps-that-created-the-new-wave-of-siem-and-ai-soc-vendors/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>How AI Impacts the Cyber Market and The Future of SIEM</title>
		<link>https://raffy.ch/blog/2026/01/16/how-ai-impacts-the-cyber-market-and-the-future-of-siem/</link>
					<comments>https://raffy.ch/blog/2026/01/16/how-ai-impacts-the-cyber-market-and-the-future-of-siem/#respond</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 21:09:01 +0000</pubDate>
				<category><![CDATA[Log Analysis]]></category>
		<category><![CDATA[Security Information Management]]></category>
		<category><![CDATA[Security Intelligence]]></category>
		<category><![CDATA[Security Market]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[siem market]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1579</guid>

					<description><![CDATA[<p>Security has always moved in waves. Not because we suddenly get smarter, but because we learn from past mistakes, identify gaps, hit limits, need to protect new technologies, and then go and do our best to solve those new security challenges with the technologies at hand. The era of AI (let&#8217;s be clear, we have [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2026/01/16/how-ai-impacts-the-cyber-market-and-the-future-of-siem/">How AI Impacts the Cyber Market and The Future of SIEM</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-full"><a href="https://raffy.ch/blog/wp-content/uploads/2026/01/ChatGPT-Image-Jan-16-2026-03_08_11-PM.jpg"><img loading="lazy" decoding="async" width="800" height="533" src="https://raffy.ch/blog/wp-content/uploads/2026/01/ChatGPT-Image-Jan-16-2026-03_08_11-PM.jpg" alt="" class="wp-image-1581" srcset="https://raffy.ch/blog/wp-content/uploads/2026/01/ChatGPT-Image-Jan-16-2026-03_08_11-PM.jpg 800w, https://raffy.ch/blog/wp-content/uploads/2026/01/ChatGPT-Image-Jan-16-2026-03_08_11-PM-300x200.jpg 300w, https://raffy.ch/blog/wp-content/uploads/2026/01/ChatGPT-Image-Jan-16-2026-03_08_11-PM-768x512.jpg 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></a></figure>



<p>Security has always moved in waves. Not because we suddenly get smarter, but because we learn from past mistakes, identify gaps, hit limits, need to protect new technologies, and then go and do our best to solve those new security challenges with the technologies at hand.</p>



<p>The era of AI (let&#8217;s be clear, we have had AI for a long time; what I mean specifically is the advent of Large Language Models) has shifted many industries, but specifically security in a particularly revealing way. AI did not just give us new tools to solve security problems. It invited innovators and entrepreneurs to revisit pretty much every security technology to see if LLMs could be useful to address some of the existing challenges. But that&#8217;s not where things stopped. More interestingly, some teams used this moment to question whether the underlying approaches themselves still made sense at all. Not just whether LLMs could help, but whether modern data architectures, different telemetry choices, and different enforcement models could fundamentally change outcomes.</p>



<p>That is what has triggered a real wave of new companies in cyber, including across markets that many considered mature, or even stagnant, like SIEM.</p>



<h2 class="wp-block-heading">The Five Phases We Just Lived Through</h2>



<p>Let’s take a non-scientific look at how major security approaches evolved over the past 25 years. This is not exhaustive, but it helps explain where we are today.</p>



<h3 class="wp-block-heading">1. Network-Centric Prevention</h3>



<p>Back, many moons ago, we started with firewalls, IDS, and later IPS. The model was simple. Look at packets. Stop bad things. It worked until attackers learned to look normal.</p>



<h3 class="wp-block-heading">2. More Data, Centralized, Higher-Level Insights</h3>



<p>When network telemetry created too many false positives, we added vulnerability data and authentication events and fed them into a SIEM to correlate. The results were &#8220;mixed&#8221;. Fortunately for the SIEM market, compliance and audit requirements emerged, mandating long-term log retention. This gave SIEM a durable justification, even when its security value was debated. SIEM became indispensable for visibility and forensics, but increasingly disconnected from real-time decision making.</p>



<h3 class="wp-block-heading">3. Back to Prevention and Response</h3>



<p>As SIEM alert volumes exploded and analysts could not keep up, the industry pivoted. EDR. NDR. SOAR. We all know how that played out. NDR never truly broke out. EDR became a major category. SOAR largely collapsed back into SIEM. And eventually, most large EDR vendors added a SIEM to their portfolio.</p>



<p>This was not convergence by design. It was convergence driven by operational gravity.</p>



<h3 class="wp-block-heading">4. AI Triggers a Reality Check</h3>



<p>LLMs made many believe they could simply layer AI on top of broken architectures. Some startups did exactly that. They will likely not be the long-term winners.</p>



<p>The more interesting group of companies used AI as a forcing function to re-examine first principles. What data actually matters? What can realistically be prevented at the edge? What must still be correlated centrally? What is structurally broken in SOC workflows? Where have we been compensating for bad architecture with human labor? Crucially, many of these answers have little to do with LLMs themselves, and much more to do with data fidelity, placement of control, and modern system design.<br /> This is where the real innovation is happening.</p>



<h3 class="wp-block-heading">5. The Convergence</h3>



<p>We are now in a phase where prevention is moving back to the edge, while analytics and orchestration remain central. Endpoints are smarter. Browsers are instrumented. Networks are being re-observed. Context is finally treated as a first-class input.</p>



<p>But there is still a SOC. There is still a central nervous system that correlates, reconstructs, explains, orchestrates, and proves what happened. Call it SIEM, security analytics, XDR, or AI SOC. The name is irrelevant. The function is not. </p>



<p>In parallel, we are realizing that we can push enforcement / prevention back to the edge. Wherever we have enough information, execute at the edge. Where we don&#8217;t, call out to your central nervous system. To your brain. The brain (your SIEM) that understands at any moment in time, what the risk and function is of every entity in your network. And use that information for decision making.</p>



<h2 class="wp-block-heading">Why AI SOC Will Collapse Back Into SIEM</h2>



<p>Many startups brand themselves as “AI SOC”. What do they actually do?</p>



<p>They primarily ingest alerts from EDR, NDR, SIEMs, and cloud platforms, then attempt to determine which ones matter. They add context, apply behavioral analysis, and suppress false positives.</p>



<p>In other words, they attempt to do what SIEM, UEBA, and SOAR were always supposed to do, just with better math and more compute. However, there is one problem. Many of the AI SOC contenders operate on alert streams. That means they start from already lossy, opinionated data. Real behavioral analysis does not on top of alert streams. It lives in raw telemetry. Email flows. Network sessions. Browser actions. Endpoint system behavior.</p>



<p>Once an AI SOC platform decides to ingest that raw data directly, it immediately recreates the ingestion, normalization, storage, and correlation problems that SIEM already exists to solve. At that point, the separation no longer makes sense. This is exactly why UEBA and SOAR collapsed back into SIEM. And it is why AI SOC will do the same.</p>



<p>There will be one place where data is reconciled, correlated, and turned into decisions. That place will increasingly run on federated, near-real-time architectures rather than twenty-year-old indexing engines. But their function remains the same. Call it whatever you want. It needs to be one system, not many and it doesn&#8217;t care what you call it.</p>



<h2 class="wp-block-heading">The Shift Is Not Just Technical. It Is Organizational.</h2>



<p>What is interesting to note about these new entrants in the SIEM or security analytics space is not just their security architecture. It is the company architecture. Modern security startups are being built on AI-native operating systems: Sales calls are captured and analyzed, not just by sales, but product teams mine them for competitive signals, marketing uses them to refine messaging, engineering uses them to prioritize roadmaps. This is not a tooling upgrade. It is a fundamentally different operating model.</p>



<p>Imagine a system where the vision, mission, strategy, and priorities are centrally maintained, updated and codified. Every function consumes that shared intelligence to drive decisions, messaging, and execution. This does not just improve alignment. It dramatically compresses learning cycles and execution speed. And that, more than any individual feature, may be the hardest thing for incumbents to replicate.</p><p>The post <a href="https://raffy.ch/blog/2026/01/16/how-ai-impacts-the-cyber-market-and-the-future-of-siem/">How AI Impacts the Cyber Market and The Future of SIEM</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2026/01/16/how-ai-impacts-the-cyber-market-and-the-future-of-siem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Venture Capital Is Betting Against Traditional SIEMs</title>
		<link>https://raffy.ch/blog/2025/12/17/why-venture-capital-is-betting-against-traditional-siems/</link>
					<comments>https://raffy.ch/blog/2025/12/17/why-venture-capital-is-betting-against-traditional-siems/#comments</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 21:29:04 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Security Information Management]]></category>
		<category><![CDATA[Security Market]]></category>
		<category><![CDATA[security investment]]></category>
		<category><![CDATA[security market]]></category>
		<category><![CDATA[SIEM]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1565</guid>

					<description><![CDATA[<p>And why most of the arguments do not hold up under scrutiny Over the past 18 to 24 months, venture capital has flowed into a fresh wave of SIEM challengers including Vega (which raised $65M in seed and Series A at a ~$400M valuation), Perpetual Systems, RunReveal, Iceguard, Sekoia, Cybersift, Ziggiz, and Abstract Security, all [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2025/12/17/why-venture-capital-is-betting-against-traditional-siems/">Why Venture Capital Is Betting Against Traditional SIEMs</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<h2 class="wp-block-heading">And why most of the arguments do not hold up under scrutiny</h2>



<figure class="wp-block-image size-full"><a href="https://raffy.ch/blog/wp-content/uploads/2025/12/ChatGPT-Image-Dec-16-2025-05_00_29-PM.jpg"><img loading="lazy" decoding="async" width="800" height="533" src="https://raffy.ch/blog/wp-content/uploads/2025/12/ChatGPT-Image-Dec-16-2025-05_00_29-PM.jpg" alt="" class="wp-image-1567" style="object-fit:cover" srcset="https://raffy.ch/blog/wp-content/uploads/2025/12/ChatGPT-Image-Dec-16-2025-05_00_29-PM.jpg 800w, https://raffy.ch/blog/wp-content/uploads/2025/12/ChatGPT-Image-Dec-16-2025-05_00_29-PM-300x200.jpg 300w, https://raffy.ch/blog/wp-content/uploads/2025/12/ChatGPT-Image-Dec-16-2025-05_00_29-PM-768x512.jpg 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></a></figure>



<p></p>



<p>Over the past 18 to 24 months, venture capital has flowed into a fresh wave of SIEM challengers including <a href="https://vega.io/?utm_source=chatgpt.com">Vega</a> (which raised $65M in seed and Series A at a ~$400M valuation), <a href="https://www.perpetualsystems.com/?utm_source=raffy.ch" title="">Perpetual Systems</a>, <a href="https://runreveal.com/?utm_source=raffy.ch" title="">RunReveal</a>, <a href="https://iceguard.io/?utm_source=raffy.ch" title="">Iceguard</a>, <a href="https://sekoia.io?utm_source=raffy.ch" title="">Sekoia</a>, <a href="https://www.cybersift.com/?utm_source=raffy.ch" title="">Cybersift</a>, <a href="https://www.ziggiz.ai/?utm_source=raffy.ch" title="">Ziggiz</a>, and <a href="https://www.abstract.security/?utm_source=raffy.ch" title="">Abstract Security</a>, all pitching themselves as the next generation of security analytics. What unites them is not just funding but a shared narrative that incumbent SIEMs are fundamentally broken: too costly, too siloed, too hard to scale, and too ineffective in the face of modern data volumes and AI-driven threats.</p>



<p>This post does not belabor each startup’s product. Instead it abstracts the shared assertions that justify recent funding and then stresses them to see which hold up under scrutiny. I am not defending incumbents. I am trying to separate <strong>real gaps from marketing (and funding) narratives</strong>.</p>



<h2 class="wp-block-heading">The “SIEM is Broken” Narrative</h2>



<p>A commonly cited <a href="https://siliconangle.com/2024/06/13/report-finds-enterprise-siem-tools-underperforming-cyberthreat-detection/" title="">industry report</a> claimed that major SIEM tools cover only about 19% of MITRE ATT&amp;CK techniques despite having access to data that could cover ~87%. That statistic is technically interesting but also deeply misleading: ATT&amp;CK technique coverage is not an operational measure of detection quality or effectiveness, it primarily reflects rule inventory and tuning effort. Nevertheless, it has become a core justification for the “SIEM is obsolete” narrative. I wasn&#8217;t able to find the original report to validate what and how they tested, but I have seen SIEMs that cover much more and have big detection teams taking care of these issues.</p>



<h2 class="wp-block-heading">The Five Core Claims Driving the Market Thesis</h2>



<p>Across decks, interviews, and marketing copy, I picked five recurring themes that define what these companies think incumbents get wrong and what investors are underwriting as the path forward.</p>



<h3 class="wp-block-heading">1. “Centralized SIEM architectures no longer scale”</h3>



<p>The claim is that forcing security telemetry into a centralized repository is too expensive and too slow for modern enterprises generating terabytes of logs every day. The proposed fixes include federated queries, analyzing data where it lives, and decoupling detection from ingestion so you never have to move or duplicate all your data.</p>



<p>The challenge is that <strong>correlation, state, timelines, and real-time detection require locality</strong>. Distributed query engines excel at ad-hoc exploration but are not substitutes for continuous detection pipelines. Federated queries introduce latency, inconsistent performance, and complexity every time you write a detection. Normalization deferred to query time pushes complexity into every rule. You do not eliminate cost, you <strong>shift it</strong> to unpredictable query execution and compute costs that spike precisely when incidents occur. Centralizing data isn’t a flaw; it is a tradeoff that supports correlation engines, summary indexes, entity timelines, and stateful detections that distributed query models struggle to maintain in real time. In fact, if the SIEM was to store the data in the customer&#8217;s S3 bucket, you can keep cost somewhat under control.</p>



<h3 class="wp-block-heading">2. “SIEM pricing is broken because it charges by data volume”</h3>



<p>A frequent refrain is that incumbent SIEMs penalize good security hygiene by tying pricing to ingestion volume, which becomes untenable as data grows. The proposed response is pricing models untethered from volume, open storage, and customer-controlled compute.</p>



<p>The challenge is that <strong>cost doesn’t vanish because you hide volume</strong>. Compute, memory, enrichment, retention, and query costs all remain. If pricing is detached from ingestion, it typically reappears as unpredictable query charges, usage tiers, or gated features. Volume is not an arbitrary metric; it correlates with the cost a vendor (or customer) incurs. Treating cost as orthogonal to data volume does not make it disappear; it just blinds you to a key cost driver. I have dealt with all the pricing models: by user, by device, by volume, &#8230; in the end I needed to make my gross margins work, guess who pays for that?</p>



<h3 class="wp-block-heading">3. “SIEM detections are weak because they rely on bad rules”</h3>



<p>New entrants commonly assert that traditional SIEM rules are noisy, static, and unable to keep up with modern threat techniques. Solutions offered include natural-language detections, detections-as-code, continuous evaluation, and AI-generated rules.</p>



<p>The challenge is that many of these still sit atop the same primitives. For example, SIGMA is widely used as a community detection language, but it is fundamentally limited: it is mostly single-event, cannot express event ordering or causality, has no native temporal abstractions or entity-centric modeling, and cannot natively express thresholds, rates, cardinality, or statistical baselines. Wrapping these limitations in AI or “natural language” does not change the underlying detection physics. You can improve workflow and authoring experience, but you do not fundamentally invent a new class of detection with the same primitives. And guess what, large vendors have pretty significant content teams &#8211; I mean detection engineering teams &#8211; often tied into their threat research labs. Don&#8217;t tell me that a startup has found a more cost effective and higher efficacy way to release detection rules. If that were the case, all these large vendors would be dumb to operate such large teams.</p>



<h3 class="wp-block-heading">4. “SIEMs lack context, causing false positives”</h3>



<p>The argument here is that existing SIEMs flood analysts with alert noise because they lack deep asset context, threat intelligence, or behavioral understanding. New entrants promise tightly integrated TI feeds, cloud context, or built-in behavior analytics.</p>



<p>Context integration has been a focus of incumbent platforms for years. The real hard problem is not <strong>accessing context</strong> but <strong>operationalizing it without drowning analysts</strong>. More feeds often mean more noise unless you have mature enrichment pipelines, entity resolution, and risk scoring built into rules that understand multi-stage attack sequences. Adding more sources does not automatically improve signal quality. The noise problem is as much about rule quality and use-case focus as it is about context availability. Apply the same argument here with regards to the quality of threat feeds that I outlined in the last item.</p>



<h3 class="wp-block-heading">5. “AI-native SIEMs will finally fix detection and response”</h3>



<p>Perhaps the most seductive claim is that incumbent SIEMs were built for a pre-AI world and that new platforms built with agentic AI at every layer will finally crack automation, detection, and investigation.</p>



<p>The challenge is that <strong>AI does not eliminate the need for structured, high-quality, normalized data, or explainability, or deterministic behavior in high-risk contexts</strong>. AI can accelerate workflows, assist with investigation, and suggest hypotheses, but it does not replace the need for precise, reproducible, and auditable detection logic. Most AI-native claims today are improvements in UX and speed, not architectural breakthroughs in detection theory.</p>



<h2 class="wp-block-heading">The Uncomfortable Conclusion</h2>



<p>VC money is flowing because SIEM is operationally hard, expensive, and often unpopular with SOC teams. There is real pain and real gaps, especially around cost transparency, scaling, and usability. But <strong>declaring existing SIEMs obsolete because they are imperfect is not a thesis</strong>; it is a marketing slogan.</p>



<p>The core assumptions driving this funding wave deserve scrutiny: centralization is treated as a flaw rather than a tradeoff necessary for continuous detection, pricing complaints get conflated with architectural insights, detection quality is blamed on tooling rather than operational realities, and AI is overstated as a panacea.</p>



<p>On the flip side, here are a couple of directions that should be looked at:</p>



<ol class="wp-block-list">
<li>Some of the new entrant SIEMs actually make a dent. They are rebuilding their entire pipelines and storage architecture with modern technologies, not old paradigms. They have a clear advantage and don&#8217;t have to deal with millions of lines of tech debt. Using an agentic AI architecture could be quite interesting here.</li>



<li>As the AI SOC emerges &#8211; and maybe become a reality &#8211; we will probably see more and more MCP servers exposing infrastructure information that can be leveraged, from alerts to context to response capabilities. But we&#8217;ll need to see how data schemas and all that will evolve.</li>



<li>The one innovation that has already generated some returns for investors is the entire data pipeline world. Companies like Observo (I had the privilege to be an advisor) have truly added something useful to the SIEMs and as I argue in one of my <a href="https://raffy.ch/blog/2025/12/03/the-trojan-horse-we-let-into-the-siem-kingdom/" title="">previous blogs</a>, needs to really become a capability baked into each SIEM out there. </li>
</ol>



<p></p>



<p>Thanks for the feedback, Jesse!</p><p>The post <a href="https://raffy.ch/blog/2025/12/17/why-venture-capital-is-betting-against-traditional-siems/">Why Venture Capital Is Betting Against Traditional SIEMs</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2025/12/17/why-venture-capital-is-betting-against-traditional-siems/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>What It Really Takes To Build A Good MSSP</title>
		<link>https://raffy.ch/blog/2025/12/05/what-it-really-takes-to-build-a-good-mssp/</link>
					<comments>https://raffy.ch/blog/2025/12/05/what-it-really-takes-to-build-a-good-mssp/#respond</comments>
		
		<dc:creator><![CDATA[Raffael Marty]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 13:33:00 +0000</pubDate>
				<category><![CDATA[Community]]></category>
		<category><![CDATA[Go To Market]]></category>
		<category><![CDATA[Security Market]]></category>
		<category><![CDATA[msp]]></category>
		<guid isPermaLink="false">https://raffy.ch/blog/?p=1558</guid>

					<description><![CDATA[<p>Everyone is suddenly looking at MSP and MSSP rollups. Investors, strategics, even VCs. The logic is obvious. Fragmented market, recurring revenue, sticky customer relationships. But the reality is that only a small subset of providers actually operate at a level worth scaling. The difference between an average MSSP and a good one comes down to [&#8230;]</p>
<p>The post <a href="https://raffy.ch/blog/2025/12/05/what-it-really-takes-to-build-a-good-mssp/">What It Really Takes To Build A Good MSSP</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-large is-resized is-style-default"><a href="https://raffy.ch/blog/wp-content/uploads/2025/12/mspgood.png"><img loading="lazy" decoding="async" width="1024" height="683" src="https://raffy.ch/blog/wp-content/uploads/2025/12/mspgood-1024x683.png" alt="" class="wp-image-1561" style="width:650px" srcset="https://raffy.ch/blog/wp-content/uploads/2025/12/mspgood-1024x683.png 1024w, https://raffy.ch/blog/wp-content/uploads/2025/12/mspgood-300x200.png 300w, https://raffy.ch/blog/wp-content/uploads/2025/12/mspgood-768x512.png 768w, https://raffy.ch/blog/wp-content/uploads/2025/12/mspgood.png 1536w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p></p>



<p>Everyone is suddenly looking at MSP and MSSP rollups. Investors, strategics, even VCs. The logic is obvious. Fragmented market, recurring revenue, sticky customer relationships. But the reality is that only a small subset of providers actually operate at a level worth scaling. The difference between an average MSSP and a good one comes down to a few fundamentals.</p>



<h2 class="wp-block-heading">Start With Focus</h2>



<p>Most MSPs never defined who they serve. They grew organically, took whatever customer showed up, and built a toolkit around individual fires rather than a repeatable model. A strong MSSP starts with clarity. Who is the ICP. What problem is being solved. What the operating model looks like for that segment. When this is missing, everything becomes random. Different tools. Different service quality. No leverage.</p>



<p>In practice, the most important segmentation is not the MSP itself, but <strong>who the MSP sells to</strong>. An MSP serving restaurants or spas has a fundamentally different security maturity, willingness to pay, and regulatory exposure than one serving regional banks, healthcare, or regulated SMBs. Treating them as one market leads to mispriced risk and churn.</p>



<h2 class="wp-block-heading">Understand the Economics</h2>



<p>Many MSPs think software licensing is their main cost. It is not. Labor dominates the model. At ConnectWise, our Service Leadership dataset showed that roughly 20 percent of MSPs were not profitable because they simply did not understand their own cost structure. The best ones hit around 20 to 25 percent EBITDA. They standardize. They price correctly. They run the business with discipline instead of firefighting.</p>



<p>The real margin killer is not the license costs. It is the <strong>technician minutes</strong> required to install, manage, respond, document, and bill every tool. Every additional product increases operational drag, even if the license is cheap.</p>



<h2 class="wp-block-heading">Standardized Security Bundles Win</h2>



<p>The MSSPs that scale do not let customers choose their own adventure. They define a required stack. If you want to be a customer, you adopt their bundle. This gives consistency, predictability, and actual security outcomes. A typical bundle includes:</p>



<p>• Patch and vulnerability management<br />• Endpoint protection<br />• Email security<br />• Security awareness<br />• Optional SIEM or MDR depending on the segment</p>



<p>Without standardization, you cannot maintain margins or guarantee service quality. You also make incident response dramatically harder because every environment looks different.</p>



<p>In reality, the bundle is usually sold at a fixed price like $50 to $100 per user per month. Any new security tool must fit inside that number. If it costs $2 to $3 per user, something else must be removed or margin gets cut. This is why getting into the bundle is harder than most vendors expect.</p>



<h2 class="wp-block-heading">Service Quality Is the Product</h2>



<p>SMBs want to be secure. They want minimal disruption. And when something goes wrong, they want a real human who knows what they are doing. Not tier 1 scripts. Not delays during an active incident. Good MSSPs prepare the customer during onboarding. They map critical systems, define escalation paths, understand what can be taken offline, and capture credentials and architecture details. They remove the guesswork from the moment the incident starts.</p>



<h2 class="wp-block-heading">Billing Needs To Be Simple</h2>



<p>One of the fastest ways to lose customers is confusing invoices. Customers want to understand what they pay for. Surprises create distrust. The MSSPs that retain well keep billing predictable, transparent, and boring.</p>



<h2 class="wp-block-heading">Own the Response, Not Just the Alert</h2>



<p>An MDR or MSSP that only notifies customers creates frustration. The provider must take the customer through remediation. For SMBs, response often means restoring operations, identifying the entry point, and closing the gap. If the MSSP cannot do this internally, it must have reliable partners.</p>



<h2 class="wp-block-heading">How Rollups Actually Create Value</h2>



<p>Rollups only work when there is a clear thesis. Some focus on platform unification and a single delivery model. Others focus on professionalizing the business with better hiring, benefits, pricing, and operational rigor. Both paths can work. But they require patience and real operating muscle.</p>



<p>The fastest way to build a defensible platform is often not direct MS(S)P sales but embedding into existing security vendors that already sit in the bundle. Winning a technology alliance with an EDR, MDR, or firewall provider puts you into hundreds of MSPs without forcing each of them to make a new buying decision</p>



<p>Cross border rollups in Europe introduce more complexity. Language and local relationships matter. Regulation varies. Centralizing delivery is possible, but customer interaction often stays local. A standardized platform can still work if the ICP is consistent across regions.</p>



<h2 class="wp-block-heading">The Microsoft Factor</h2>



<p>Many SMBs already own security features through M365. Ignoring this leads to bloated stacks and poor pricing. Smart MSSPs align their offering with what customers already have and fill the real gaps.</p>



<h2 class="wp-block-heading">The Bottom Line</h2>



<p>Building a strong MSSP is not mysterious. It requires a defined ICP, a standardized security bundle, disciplined delivery, true incident readiness, transparent billing, and the ability to take customers all the way to resolution. The providers that do these things consistently are the ones worth scaling. Investors often chase the rollup story, but the real value sits inside the boring operational fundamentals that most of the market never gets right.</p><p>The post <a href="https://raffy.ch/blog/2025/12/05/what-it-really-takes-to-build-a-good-mssp/">What It Really Takes To Build A Good MSSP</a> first appeared on <a href="https://raffy.ch/blog">Future of Tech and Security: Strategy & Innovation with Raffy</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://raffy.ch/blog/2025/12/05/what-it-really-takes-to-build-a-good-mssp/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin


Served from: raffy.ch @ 2026-04-09 08:49:31 by W3 Total Cache
-->