The category difference
Security information and event management is the log-aggregation-and-correlation category. A SIEM ingests logs from every source in the environment, stores them for compliance-driven retention periods, and runs custom correlation rules written by the customer’s detection engineers against the raw log data. SIEM is schema-flexible, accepting any log format with a parser; it is priced primarily on data volume, because data volume is the dominant cost driver for the vendor too.
Extended detection and response is the platform-with-first-party-telemetry category. An XDR platform ingests telemetry from its own sensors (or a curated set of integrations in open XDR), applies pre-written detection content optimised for that telemetry, and exposes native response actions. XDR is schema-rigid, optimised for specific sensor types; it is priced primarily per asset (endpoint, user, workload) because asset count is the stable cost driver.
The categories overlap on detection and response. They diverge on retention, custom correlation, and data volume economics.
Where they overlap
Both tools detect security incidents by correlating events across sources. Both retain data for some period. Both provide an analyst console for investigation. For small-to-mid environments without heavy compliance requirements, either tool can cover the detection and response workload competently, and the choice comes down to cost structure and ecosystem fit rather than capability.
Modern XDR platforms have added SIEM-like features: longer retention tiers, third-party log ingestion at a per-GB rate, and custom detection content authoring. Modern SIEMs have added XDR-like features: pre-built detection content, native endpoint integrations, and platform-operated response actions. The categories are converging, but they have not merged.
Where XDR falls short of SIEM
Three capabilities are still SIEM territory, and the gap is the reason most regulated organisations keep both.
Compliance retention
PCI DSS requires twelve months of audit logs with ninety days immediately available. HIPAA requires six years of audit logs covering access to ePHI. SOX requires seven years of financial-system logs. XDR platforms can meet these retention requirements, but the ingestion and retention overage cost typically exceeds a SIEM’s storage-tier pricing for the same volume. For audit-log retention specifically, SIEM is usually the cheaper option.
Custom detection engineering
SIEM query languages are designed for security engineers to write detections against arbitrary log data. Splunk SPL, Microsoft Sentinel KQL, Elastic EQL all let analysts write detections that inspect any field in any log. XDR platforms expose more limited custom-detection interfaces, because their detection engines are optimised for pre-defined sensor schemas. Mature security teams with custom detection engineering capability often find XDR’s custom-content interface insufficient.
Third-party log breadth
SIEMs accept any log format through parser configuration. Appliance logs, mainframe logs, bespoke application logs, legacy infrastructure logs all flow into a SIEM with a parser, and detections run against all of them. XDR platforms’ third-party ingestion is curated: supported sources have pre-built integrations, unsupported sources require custom work or are not ingested. For heterogeneous environments with many legacy sources, SIEM is usually the only viable option for full coverage.
Where SIEM falls short of XDR
The reverse gap is real and drives XDR adoption even in SIEM-rich environments.
- Native response actions. SIEMs detect; they rarely respond natively. XDR platforms isolate endpoints, revoke sessions, and block senders from the same console that raised the alert. SIEM-based response requires SOAR integration or separate tool invocation.
- First-party endpoint telemetry. SIEMs ingest endpoint logs after an EDR sensor has processed them; XDR operates the sensor directly. The telemetry richness and the response speed are both better with first-party sensor control.
- Analyst workflow. XDR consoles are designed around incidents (groups of correlated alerts). SIEMs present raw alerts that analysts must correlate manually. For small-to-mid SOCs without dedicated detection engineers, XDR’s pre-correlated incidents are materially faster to triage.
- Cost at high data volumes. SIEM volume pricing becomes punishing above one hundred GB per day of ingestion. XDR’s asset-based pricing is often significantly cheaper at scale for the subset of telemetry the platform covers.
The cost comparison
SIEM is priced on data volume first: the larger the daily ingest, the larger the bill. Typical published ranges for mid-tier SIEMs run from one dollar to five dollars per GB per day depending on retention window, with enterprise platforms at the high end. For a fifty-GB-per-day environment with ninety-day retention, mid-range SIEM licensing runs $75,000 to $150,000 per year before onboarding.
XDR is priced per asset first: the larger the endpoint, user, and workload count, the larger the bill. For fifteen hundred endpoints at ten dollars per endpoint per month, XDR licensing runs $180,000 per year before modules and ingestion.
Which is cheaper depends on the ratio of data volume to asset count in your environment. Log-heavy shops (high GB per day relative to endpoint count) usually find XDR cheaper because asset pricing stays flat while SIEM volume pricing scales with logs. Asset-heavy shops (many endpoints, modest logs) usually find SIEM cheaper because volume pricing stays flat while XDR asset pricing scales with devices.
For the dedicated SIEM framework see siemcostcalculator.com.
When to keep both
Most large regulated enterprises run both. The common pattern is XDR as the primary detection-and-response platform for security operations day-to-day, and SIEM as the compliance-retention archive and custom detection engine for long-tail sources. XDR handles the alerts analysts investigate; SIEM handles the queries auditors run. Both cost money. Both add value. The alternative (dropping SIEM to save money) usually creates compliance gaps that cost more than the SIEM license.