We performed a comparison between Elastic Security and Webroot Business Endpoint Protection based on real PeerSpot user reviews.
Find out in this report how the two Log Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is the search function, which allows me to go directly to the target to see the specific line a customer is searching for."
"The solution has a good community surrounding it for lots of helpful documentation for troubleshooting purposes."
"Stability-wise, I rate the solution a ten out of ten."
"ELK is open-source, and it will give you the framework you need to build everything from scratch."
"I can look at events from more than one source across multiple different locations and find patterns or anomalies. The machine learning capabilities are helpful, and I can create rules for notifications to be more proactive rather than responding after something has gone wrong."
"The indexes allow you to get your results quickly. The filtering and log passing is the advantage of Logstash."
"The scalability is good. It can be scaled easily in the production environment."
"The most valuable thing is that this solution is widely used for work management and research. It's easy to jump into the security use case with the same technology."
"Their policy management, their cloud-based dashboard and user interface are very easy to navigate."
"It is excellent endpoint protection for mobiles that does everything it says it will."
"They have a lot of features integrated from way back, which shows that the product developers know exactly what they're doing."
"I rate the initial setup phase a ten on a scale of one to ten, where one is difficult, and ten is easy."
"Low performance requirements."
"It monitors traffic and keeps us from getting ransomware or other viruses."
"Valuable features include good scanning, very light footprint and management console that the client can access and (just as important) in which I can see status of groups of computers (I am a consultant, IT role)."
"The solution is very simple and straightforward to use."
"We had issues with scalability. Logstash was not scaling and aggregation was getting delayed. We moved to Fluentd making our stack from ELK to EFK."
"We'd like better premium support."
"This type of monitoring is not very mature just yet. We need more real-time information in a way that's easier to manage."
"It is difficult to anticipate and understand the space utilization, so more clarity there would be great."
"The setup process is complex. You need a solid working knowledge of networking, operating systems, and a little programming."
"The Integration module could be improved. It is a pain to build integration with any product. We have to do parking and so on. It's not like other commercial solutions that use profile integration. I would also see more detection features on the SIEM side."
"An area for improvement in Elastic Security is the pricing. It could be better. Right now, when you increase the volume of logs to be collected, the price also increases a lot."
"Upgrades currently released as stacks when it should be a plugin or an extension to save removal and reinstallation."
"The solution could improve by providing better ransomware protection."
"It needs to improve the problems with the faster connection, and have a huge reduction in false positives."
"We need to have a stronger defense against CryptoLock and other attackers."
"Reporting system could be improved."
"It doesn't do anything proactive. The virus has to hit the machine before it detects it."
"It would be great if there was a feature which would allow you to scan an individual file on an endpoint user's computer."
"We need to know more details about how the virus interacted with the computer."
"The only complaint I have with Webroot is its inability to prevent UoD phishing and its inability to check against bots or block anti-attacks. Plus the URL server is in zero-definition."
More Webroot Business Endpoint Protection Pricing and Cost Advice →
Elastic Security is ranked 5th in Log Management with 59 reviews while Webroot Business Endpoint Protection is ranked 34th in Endpoint Protection Platform (EPP) with 30 reviews. Elastic Security is rated 7.6, while Webroot Business Endpoint Protection is rated 8.2. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of Webroot Business Endpoint Protection writes "Lightweight and not hard to set up however, does not offer good reporting". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas Webroot Business Endpoint Protection is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress, HP Wolf Security and SentinelOne Singularity Complete. See our Elastic Security vs. Webroot Business Endpoint Protection report.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.