We performed a comparison between Recorded Future and USM Anywhere based on real PeerSpot user reviews.
Find out what your peers are saying about Recorded Future, Check Point Software Technologies, Microsoft and others in Threat Intelligence Platforms."As a threat intelligence tool, it's very helpful."
"The most valuable features of Recorded Future are the useful alerts it provides. If we are monitoring a domain, the solution will provide us with an alert in a prompt manner. It is simple for clients to receive alerts. The advanced search is useful for more accurate filter results."
"The most valuable feature is Recorded Future's protection of exposed customer data on the hardware side."
"The solution is diverse and provides me with a lot of different mechanisms for evaluation."
"The intel that they were providing us over the emails was very good. If it found any hashtag in our organization's name on the dark web, a rogue IP, or a marketplace, it would send us an email and notify us that this is being mentioned, and if we want, they can take some action."
"Has the ability to conduct and build any query without limitations."
"The most valuable feature of Recorded Future is how it detects everything regarding our domain."
"From the feedback I've received from my clients, the most valuable feature is the ability to personalize the solution. The ability to have a customized dashboard makes it easy for leadership and management to obtain details. Intelligence analysts or security engineers care about the actions and results, whereas the leadership care about graphs and reports. Recorded Future helps my clients create reports and also determine how the intelligence that is generated is consumed. They can easily show the benefits to the leadership without them having to invest 10 hours a week into transferring numbers into a graph or into creating reports."
"The Event Correlation and vulnerability scans have been the most useful. As a 24/7 SOC, we use the incoming alarms to give an overview of suspicious traffic going through the network. It's easy to look at the correlated events and see the broad picture of traffic for that customer. Vulnerability scans are good for providing patch and remediation guidelines to keep customer systems secure."
"It brought our logs into one place for review and set up alarms based on changes we were missing due to lack of having one place for everything to go."
"Allowed us to help our customers satisfy compliance needs around logging and monitoring."
"This solution can completely detect and prevent incidents on your network."
"It allows for a lot of out-of-the-box features: vuln scanning, HIDS/HIPS, and IDS."
"The solution has all the features that we need, however they do not work correctly."
"The new cloud-based panel is excellent both for client review as well as for our SOC to review and respond to threats. It is much easier to configure and use than the previous solution from AlienVault."
"This is a USM, so being able to get all the features under one roof makes it a good product with good new features."
"The solution would benefit from introducing automation."
"Recorded Future is a very expensive solution, and its pricing could be improved."
"Lacks sufficient visibility of malware and international APT attacks."
"When you add one website to Recorded Future, it should automatically call all other websites and social media platforms."
"It sometimes detects false positives and reduces the overall accuracy of the system."
"At present, my clients need to be trained by me or another organization on how to use Recorded Future and how to get the best out of it as an analyst, engineer, and administrator. It would be better if clients could directly learn these things without having to go through me or other organizations."
"There is a semantic oncology dynamic relationship between how the MIGR Tech framework needs more data infusion enrichment capabilities."
"The solution could improve in reducing the false positives. However, most of the other tools on the market have false positives. If they enhance their data algorithm, it could improve the accuracy of results and minimize false positives. Identifying patterns of false possibilities can aid in developing better reporting features that could potentially eliminate them in the future. This recording feature tool could benefit from adopting similar techniques utilized by other tools to enhance its functionality. By doing so, it could minimize the need for manual efforts in distinguishing true positives from false positives, ultimately reducing the workload."
"The reporting tools are a bit lacking for building reports to give directly to customers, but support has been helpful in giving our requests for new features to the development team and following up with us."
"It would be nice to see some machine learning and monitoring of the configuration in network devices."
"For creating new rules, you have to be familiar with regular expressions. I feel there could be something built-in to make sure that process is easier."
"The only complex area of the setup was writing the custom scripts."
"I want to see more compliance management capability. The quality of integrations seems to be a little bit low."
"The one thing I continue to dislike about the USM is the limitation on reports."
"Different functions to customize reports should be added."
"The price of AT&T AlienVault USM could be reduced."
Recorded Future is ranked 1st in Threat Intelligence Platforms with 10 reviews while USM Anywhere is ranked 11th in Security Information and Event Management (SIEM) with 113 reviews. Recorded Future is rated 8.6, while USM Anywhere is rated 8.4. The top reviewer of Recorded Future writes "Traceless online searches, stable, and scalable". On the other hand, the top reviewer of USM Anywhere writes "Easy to use and affordable". Recorded Future is most compared with ZeroFOX, CrowdStrike Falcon, Intel 471, Digital Shadows and Anomali ThreatStream, whereas USM Anywhere is most compared with Wazuh, AlienVault OSSIM, IBM Security QRadar, Splunk Enterprise Security and Microsoft Sentinel.
We monitor all Threat Intelligence Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.