We performed a comparison between Elastic Security and WithSecure Elements Endpoint Detection and Response based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"We have FortiEDR installed on all our systems. This protects them from any threats."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"Forensics is a valuable feature of Fortinet FortiEDR."
"The stability is very good."
"It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"The most valuable feature is the ability to collect authentication information from service providers."
"It's very customizable, which is quite helpful."
"Stability-wise, I rate the solution a ten out of ten."
"It is an extremely stable solution. Stability-wise, I rate the solution a ten out of ten."
"We've found the initial setup to be quite straightforward."
"The most valuable features of the solution are the prevention methods and the incident alerts."
"I can look at events from more than one source across multiple different locations and find patterns or anomalies. The machine learning capabilities are helpful, and I can create rules for notifications to be more proactive rather than responding after something has gone wrong."
"The feature that we have found the most valuable is scalability."
"It is a scalable solution."
"WithSecure includes an encrypted drive that stores a key for accessing the encrypted data."
"It offers good scalability."
"The product is stable."
"I use the solution to protect our infrastructure. The tool has special frames for banking. There is an additional secure filter for banking-related pages. It protects me from viruses, malware, and attacks."
"The only issue that we have today is with false positives. We have too many false positives with the solution."
More WithSecure Elements Endpoint Detection and Response Pros →
"We find the solution to be a bit expensive."
"Intelligence aspects need improvement"
"The solution is not user-friendly."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"The dashboard isn't easy to access and manage."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"The solution is not stable."
"Upgrades currently released as stacks when it should be a plugin or an extension to save removal and reinstallation."
"One thing they could add is a quick step to enable users who don't have a solid background to build a dashboard and quickly search, without difficulty."
"There is an area of improvement in the Logs list. The load list may need to be paginated as there are limits."
"The training that is offered for Elastic is in need of improvement because there is no depth to it."
"It's a little bit of a learning curve to understand the logic of searching for things and trying to find what you're looking for in Elastic Security."
"We set up a cron job to delete old logs so that we wouldn't hit a disk space issue. Such a feature should be available in the UI, where old logs can be deleted automatically. (Don’t know if this feature is already there)."
"The setup process is complex. You need a solid working knowledge of networking, operating systems, and a little programming."
"We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."
"Its automated functionality could be better."
"The tool’s mobile version needs to be improved."
"The monthly reporting feature of WithSecure can be improved."
"The initial setup is very straightforward."
"WithSecure Elements Endpoint Detection and Response is scalable. My company has 800-1000 customers."
"The website rules are too complicated."
More WithSecure Elements Endpoint Detection and Response Cons →
More WithSecure Elements Endpoint Detection and Response Pricing and Cost Advice →
Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 59 reviews while WithSecure Elements Endpoint Detection and Response is ranked 32nd in Endpoint Detection and Response (EDR) with 6 reviews. Elastic Security is rated 7.6, while WithSecure Elements Endpoint Detection and Response is rated 8.0. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of WithSecure Elements Endpoint Detection and Response writes "Has an additional secure filter for banking-related pages and protects from viruses, malware, and attacks". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas WithSecure Elements Endpoint Detection and Response is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Trend Vision One and Cynet. See our Elastic Security vs. WithSecure Elements Endpoint Detection and Response report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.