We performed a comparison between LogPoint and USM Anywhere based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: LogPoint is noted for its advanced technology and extensive log-collection, parsing, and analysis mechanisms. USM Anywhere is highly regarded for its extensive reporting capabilities, thorough vulnerability assessment, seamless file integration, and user-friendly management features. LogPoint can improve its dashboard customization, resource efficiency, network hierarchy diagrams, and agent deployment. USM Anywhere users have suggested improvements in self-service plugin management, database optimization, and third-party threat intelligence integration.
Service and Support: LogPoint's customer service receives high marks for its exceptional technical support and responsive engineers, but some users reported delays in receiving help from higher-level support. Some users say that USM Anywhere's customer service is knowledgeable and responsive, while others have faced delays and incomplete answers.
Ease of Deployment: The complexity of LogPoint's initial setup can range from complex and time-consuming to fast and easy, depending on the user's experience and the organization’s size. The initial setup for USM Anywhere is generally considered to be straightforward if the user has technical knowledge. Vendor assistance is also available during the deployment phase.
Pricing: LogPoint's fixed pricing model is seen as cost-effective and competitive. USM Anywhere is seen as more cost-effective than premium solutions like IBM QRadar and Splunk, with pricing considered reasonable and relatively low.
ROI: LogPoint makes costs more predictable and enables companies to generate revenue through security operation services. USM Anywhere has garnered favorable feedback regarding its ROI.
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"The most valuable feature is the analysis, because of the beta structure."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"The stability is very good."
"It is stable and scalable."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"We like the user and entity behaviour analytics (UEBA) and find it valuable."
"The search feature is valuable. The dashboards are also valuable for our bosses. Another valuable feature, which is the main feature of the product, is the centralization of all the logs."
"The main advantage of Logpoint is the support service. They reply within ten minutes to an hour to our queries."
"Technical support is responsive and very friendly."
"The flexibility of the search feature and the solution's analytics features are the most valuable parts of the solution."
"Log collection, dashboards and reporting are good."
"The solution's most valuable aspect is the combination of the software and the support that they have."
"The integration is very user-friendly. There are not many CLI commands. Everything is directly accessible from the web interface."
"The asset management functionality (active and passive scans) is also really important. You can't protect what you do not know about, so having an inventory of all your devices and software is critical to a security management program."
"The most valuable feature is threat intelligence."
"Any unusual behaviour, we can monitor. We have alerts set up to be sent when we receive signs of any unusual behaviour."
"It allows for a lot of out-of-the-box features: vuln scanning, HIDS/HIPS, and IDS."
"As we have to service several servers, we can manage them in a economical way, which is beneficial to our team and business."
"Reports are customized, so you can present them to executives or engineers."
"In terms of monitoring, my best feature would be the monitoring of components across the network. It monitors the respective nodes and any new node that comes onto the network and provides reports. The reporting dashboards are really helpful for management in terms of making decisions around patch management."
"The setup is very easy and straightforward."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"The only minor concern is occasional interference with desired programs."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"The SIEM could be improved."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"ZTNA can improve latency."
"Logpoint is not flexible. Its documentation is not user-friendly."
"Dashboards could be developed further."
"It is a good product, but its interface or GUI could be better."
"Sometimes, the product is not stable."
"One of the downsides is it is not a SaaS solution. It must be on-premises."
"Log management could be better because transporting the log from a password to the client system takes time."
"The solution should offer more integrations and third-party solutions like incident response platforms or allow access to third-party big data"
"What could be improved in LogPoint is its UI because it's less friendly to users than LogRhythm. The UI could be more aesthetically appealing to users. It's completely outdated."
"I feel that some areas of improvement would be vulnerability scanning. We use a separate product that seems to do a much better job."
"The UI and overall processes need a little bit more love. This shows in the error banners that come up when you select certain things. There isn't a day that goes by that the UI doesn't error out and I can't view events for an alarm."
"The one thing I continue to dislike about the USM is the limitation on reports."
"I think plugin management should be self-service on AlienVault USM. The other product is self-service but on the USM side. You have to submit a ticket then AT&T creates and updates the plugins."
"Maybe logs are the problem, as the database query is too slow. If you want to search something, you need time to find it."
"AlienVault must improve their correlation feature. Some of the events do not match with the correlation rules and some of the correlation events are false-positive."
"The dashboard could be improved as well as the level of customization."
"Plugins could be better utilized, as some of them do not recognize all logs."
Logpoint is ranked 26th in Security Information and Event Management (SIEM) with 20 reviews while USM Anywhere is ranked 11th in Security Information and Event Management (SIEM) with 113 reviews. Logpoint is rated 7.4, while USM Anywhere is rated 8.4. The top reviewer of Logpoint writes "Good technical support but it is complex to use and resource-heavy". On the other hand, the top reviewer of USM Anywhere writes "Easy to use and affordable". Logpoint is most compared with IBM Security QRadar, Elastic Security, Rapid7 InsightIDR, Microsoft Sentinel and Falcon LogScale, whereas USM Anywhere is most compared with Wazuh, AlienVault OSSIM, IBM Security QRadar, Splunk Enterprise Security and Microsoft Sentinel. See our Logpoint vs. USM Anywhere report.
See our list of best Security Information and Event Management (SIEM) vendors, best Log Management vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.