Most Helpful Review
Users/endpoints focus gives us more understanding of network events, allowing us to see behavior patterns
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The product satisfies our compliance, and thus, all of our auditors. All of the data that we use and store for all security events is required by our auditors to be kept in a central storage location.
If we need to do a search for user lockouts, we can go, search, and find locations where they have been locked out, then keep track of those events, historically.
The network alert is the most valuable feature. That way, we in the IT department are aware of user lockout and invalid password attempts way before a user ever even calls in.
The most important feature is keeping track of when accounts are created and deleted, when permission groups are changed, and memberships are changed in groups; and overall, how many errors are occurring on the various systems that we're monitoring.
The SIEMs and managed service are its most valuable features. We get a weekly report from them which provides a culmination of them combing through millions of events which are triggered across our network every day and minute. Their information security experts basically boil that down to a report which I get emailed once a week. It identifies potential threats and the remediation that I should take to be able to quell those threats.
The threat alerts it gives me from time to time on harmful code within the network, or if they are generating any network traffic, are very useful.
The incident case management is the most valuable feature. Even though there's always something I find I would like to add to that feature, the ability to quickly sort through all the logs, network and endpoint data, etc., and add it to an incident case as part of the investigation, is nice. Having it automatically timeline that additional data into the original incident timeline, and correlate it to other notable events and activities on the network, results in a huge improvement in our overall confidence that we've quickly traced down the right source of an issue.
The alerting to drive investigations and remediation has been its most valuable feature.
It improved my organization by building a security alerting program.
User behavioral analytics allows us to pinpoint abnormal or suspicious behavior among millions of events every day.
Log search allows us to dive deep into aggregated logs and query all event types at once.
The log aggregation and storage provided by InsightIDR has shown no issues with scalability; aggregating over one hundred millions events daily.
InsightIDR has allowed us to find potential security issues that we did not know existed, and get remediation quickly.
I am able to run automated actions based on the output of reports, leaving me extra time to focus on more pressing matters.
The biggest problem is that we have too many domain controllers. So, we have to keep all the clients and main system updated with the latest versions along with making sure all the firewalls are open.
There are some issues with searches taking a long period of time, but they assured me that they have implemented a new search function that's available in version 9, but which requires a solid-state hard drive... Depending on how many logs you have it could take a long time to return the results if you're looking back prior to the last 30 days.
I'd like to see improvement in the ease of generating reports. It seems fairly cumbersome whenever you decide to start tracking new categories of events. It seems a little kludgy when trying to generate those reports.
The deployment of the agents could be a bit easier. We always seem to have a bit of a challenge with that. A lot of times the agents either don't deploy or they quit responding, then we have to go and redeploy them.
It takes some time. It does not give me a prompt response for any such [malicious] traffic. It takes time to get that alert from the AlienVault system.
The reporting is the weakest aspect. There needs to be multi-level grouping for events (for example, group by user and destination). Right now, we can do a group by user and a separate table or group by destination. But I'd be more interested in where a person was logging into instead of who was logging in or where he was logging in.
Customised alert recipients need to be added to allow better first-line action and quicker response. Configurable honeypots would be a welcome addition.
It would be useful to import threat intelligence in YARA format along with known incorrect email addresses.
I feel it would greatly benefit from more supported log sources.
The ability to tune the collector for custom logs would greatly help.
I would like the ability to adjust the threshold of certain existing alerts. Currently the only option is to change the notifications or create my own alert.
One thing that springs to mind is easier API integration with ITSMs. We are evaluating a new ITSM and I would like to have InsightIDR create a ticket when an attack is identified, and the ticket would be closed in InsightIDR when the ITSM resolution is completed. This would take out the "single point of failure" we currently have, if the email recipient is somehow absent, in recording the risk appetite for the incident and the actions taken to mitigate or not.
Pricing and Cost Advice
The upfront costs have increased, and we have been locked into this contract. The cost of changing over from it is way too high.
The solution is fairly expensive, but in my experience, all of the SIEM applications that I've evaluated or looked at cost about the same.
Licensing is very easy. Our CIO takes care of the billing, but in terms of price point, he hasn't complained, so it must be good.
The pricing and licensing seem very reasonable. The managed service part of it feels like it gives me the equivalent of a full-time engineer for a lot less money. So, I feel it's a good value.
AlienVault pricing is the best. Whatever cost you are paying, you are getting a return on every penny... It's not like your IBM, your QRadar, or Splunk, where the cost is too high.
Licensing is by endpoint and amount of retention time (at least ours is). Default retention was one year, but we are able to push the retention further if needed. There's also a provide-your-own-S3 option for longer retention if you don't want to pay for the additional retention years in your Rapid7 agreement.
The pricing and licensing are competitive.
Accurately predict your licensing counts as this is a subscription based product.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
Licensing is straightforward. If, for some reason, you don’t meet the minimum licensing requirements, there is a third-party managed service that can help.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
Compared 37% of the time.
Compared 19% of the time.
Compared 10% of the time.
Compared 73% of the time.
Compared 27% of the time.
Compared 14% of the time.
Compared 13% of the time.
Compared 9% of the time.
Also Known As
EventTracker by Netsurion delivers actionable security intelligence that empowers organizations of any size to effectively detect and respond to advanced threats.
EventTracker Security Center
AlienVault OSSIM, Open Source Security Information and Event Management (SIEM), provides you with a feature-rich open source SIEM complete with event collection, normalization and correlation. Launched by security engineers because of the lack of available open source products, AlienVault OSSIM was created specifically to address the reality many security professionals face: A SIEM, whether it is open source or commercial, is virtually useless without the basic security controls necessary for security visibility.
Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.
Learn more about EventTracker
Learn more about AlienVault OSSIM
Try It For Yourself
Get started today!
|The Salvation Army, The FRESH Market, Pacific Western Bank, AAOS, Vanderbilt University, Talbots||Council Rock School District||Liberty Wines, Pioneer Telephone, Visier|
Financial Services Firm28%
Comms Service Provider22%
No Data Available
Non Tech Company22%
Comms Service Provider20%
See also AlienVault OSSIM Reviews, Rapid7 InsightIDR Reviews, and our list of Best Security Information and Event Management (SIEM) Companies.