We performed a comparison between Alert Logic and Vectra AI based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, SentinelOne and others in Vulnerability Management."Everything is in one dashboard; I'm notified when there's an incident and advised on what steps to take."
"The initial setup is pretty straightforward."
"The solution was consistently available, and I cannot recall any instances where it was down."
"Notifications and the detail of notifications are most valuable. It is a user-friendly solution."
"The installation and configuration were slick."
"While I still have on-premises appliances, I can remotely monitor everything from the cloud, and Alert Logic's ease-of-access features have helped me streamline my workflow and reduce implementation time."
"We receive infrastructure security warnings from it. So, we know what is going on and what needs to be addressed."
"It has the ability to install agents. It is pretty straightforward. You can automate the process pretty easily."
"It has reduced the time it takes to respond to attacks. That comes back to the proactive point. It makes us able to lower down in the kill chain, we can react now, rather than reacting to incidents that happened, we can see an instant, in some cases, as it's being implemented, or as it's being launched."
"The solution's ability to reduce alerts, by rolling up numerous alerts to create a single incident or campaign, helps in that it collapses all the events to a particular host, or a particular detection to a set of hosts. So it doesn't generate too many alerts. By and large, whatever alerts it generates are actionable, and actionable within the day."
"What I like best about Vectra AI is that it alerts you about suspicious activities."
"Vectra AI can bring the ability to detect intrusion on the network more so than legacy IDS tools."
"The initial setup was pretty straightforward."
"Vectra produces actionable data using automation. That has helped us. It's less manpower now to look at incidents, which has definitely increased efficiency. Right now, in a lot of cases, our mean time to detection is within zero days. This tells me by the time something happened, and we were able to detect it, it was within the same day."
"The most useful feature is the anomaly detection because it's not signature-based. It picks up the initial part of any attack, like the recon and those aspects of the kill chain, very well."
"The fact that we get the visualization of what's happening on our network, which is a way of improving our security in-depth is most valuable."
"They have ideas and email you whatever they find, but they don't have a dedicated security team who will work on an attack or a specific security instance."
"I would like to see it do initial scans and start capturing data, which it will truly analyze, not just be a reporting system saying, "Here is an email. Here is an email. Here is an email.""
"Its menu is not very intuitive. I would like to see the user menu expanded a bit. The user menu is very layered, and because of the layers, you have to go down a path that is not very intuitive."
"We'd like to have triggered alerts sent to us so we see errors quicker."
"The setup process was complex."
"The product needs to mature. We don't want to be bombarded with unnecessary issues and have the real ones slip through."
"The documentation, especially with the initial setup, needs improvement."
"This product needs to mature more. While it is a good product, there are some areas where it needs work."
"A blind spot that I have is around the ease with which you can automate threat intervention."
"Some of the customization could be improved. Everything is provided for you as an easy solution to use, but working with it and doing specific development could be worked on a bit more in the scope of an incident response team."
"One thing which I have found where there could be improvement is with regard to the architecture, a little bit: how the brains and sensors function. It needs more flexibility with regard to the brain. If there were some flexibility in that regard, that would be helpful, because changing the mode of the brain is complex. In some cases, the change is permanent. You cannot revert it."
"I would like to see data processed onshore. Right now, the cloud components, like Office 365, must be processed on servers outside of Australia. I would like to see a future adoption of onshore processing."
"In education as a sector, we are looking at AI a lot in terms of how it can be used as part of the teaching and learning side of things. It would be great to have Vectra AI look at a better way to enhance the security posture related to the AI tools in our portfolio."
"For S&D account scans, it would be easier if Vectra AI could triage with users. If a client uses a lot of accounts, then it could indicate that these accounts are benign, for example. That would help a lot."
"I think Vectra AI's automation, reporting, and integration could be improved."
"Other alternatives, like Darktrace, have a fancier UI."
Alert Logic is ranked 28th in Vulnerability Management with 11 reviews while Vectra AI is ranked 2nd in Intrusion Detection and Prevention Software (IDPS) with 42 reviews. Alert Logic is rated 8.0, while Vectra AI is rated 8.6. The top reviewer of Alert Logic writes "Great reporting and session logic with an easy initial setup". On the other hand, the top reviewer of Vectra AI writes "Integrates well with other security solutions and provides good technical support". Alert Logic is most compared with CrowdStrike Falcon Complete, Arctic Wolf Managed Detection and Response, Sophos MDR and Rapid7 InsightIDR, whereas Vectra AI is most compared with Darktrace, ExtraHop Reveal(x), Cisco Secure Network Analytics, Arista NDR and Corelight.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.