AT&T AlienVault USM vs. Fortinet FortiSIEM (AccelOps)

As of June 2019, AT&T AlienVault USM is ranked 4th in Security Information and Event Management (SIEM) with 49 reviews vs Fortinet FortiSIEM (AccelOps) which is ranked 15th in Security Information and Event Management (SIEM) with 4 reviews. The top reviewer of AT&T AlienVault USM writes "Provides us with flexible deployment architecture". The top reviewer of Fortinet FortiSIEM (AccelOps) writes " It's complicated to deploy but detection rules are flexible". AT&T AlienVault USM is most compared with Splunk, ELK Logstash and IBM QRadar. Fortinet FortiSIEM (AccelOps) is most compared with Splunk, AT&T AlienVault USM and IBM QRadar. See our AT&T AlienVault USM vs. Fortinet FortiSIEM (AccelOps) report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about AT&T AlienVault USM vs. Fortinet FortiSIEM (AccelOps) and other solutions. Updated: May 2019.
347,745 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The product satisfies our compliance, and thus, all of our auditors. All of the data that we use and store for all security events is required by our auditors to be kept in a central storage location.If we need to do a search for user lockouts, we can go, search, and find locations where they have been locked out, then keep track of those events, historically.The network alert is the most valuable feature. That way, we in the IT department are aware of user lockout and invalid password attempts way before a user ever even calls in.The most important feature is keeping track of when accounts are created and deleted, when permission groups are changed, and memberships are changed in groups; and overall, how many errors are occurring on the various systems that we're monitoring.The SIEMs and managed service are its most valuable features. We get a weekly report from them which provides a culmination of them combing through millions of events which are triggered across our network every day and minute. Their information security experts basically boil that down to a report which I get emailed once a week. It identifies potential threats and the remediation that I should take to be able to quell those threats.

Read more »

Intense monitoring and detection of the source of network probes.This solution can identify many threats inside the organization (compromised endpoints, configuration issues), as well as "outside" threats (botnets, network scanners, web-attacks, etc).AlienVault provides a checklist answer when using SIEM.It provides a single pane of glass view, coupled with a whole security ecosystem. The ability to manage everything from a central point, including vulnerability assessments, asset management - including the services provided by the various hosts, NIDS, HIDS, etc. - provides a very efficient way of dealing with things.The IDS and the threat intelligence are very useful. They are very intuitive and data-rich.On any given day I could give you a different answer regarding the most valuable features of the product. The feature that is most important is the fact that it has a lot of features, that it's not just a log collection and correlation system, that it has a lot of other components built in. The bundle of features is really the killer feature.Log-monitoring and alerting enable us to know when things happen that we need to know about.The dashboards are very descriptive and contain just the right amount of information. The activity alarms and events contain a plethora of data that is very descriptive and useful.

Read more »

It gives us the opportunity to generate notifications based upon rules that get triggered, and the rules could be specific to PCI, HIPAA, GIBA, NIST, and so forth.Some of our customers who use this solution have seen improvement in their connection with load balancing on both connections.AccelOps can handle a lot of data and it's just so important to true monitoring. Also, I can create a lot of rules to detect anything I like.Analytics. It can provide log information from the device. With log information, I can see if there is a threat

Read more »

Cons
The biggest problem is that we have too many domain controllers. So, we have to keep all the clients and main system updated with the latest versions along with making sure all the firewalls are open.There are some issues with searches taking a long period of time, but they assured me that they have implemented a new search function that's available in version 9, but which requires a solid-state hard drive... Depending on how many logs you have it could take a long time to return the results if you're looking back prior to the last 30 days.I'd like to see improvement in the ease of generating reports. It seems fairly cumbersome whenever you decide to start tracking new categories of events. It seems a little kludgy when trying to generate those reports.The deployment of the agents could be a bit easier. We always seem to have a bit of a challenge with that. A lot of times the agents either don't deploy or they quit responding, then we have to go and redeploy them.

Read more »

The inability to control changes from a centralized application by managing devices directly.It would be nice to see some machine learning and monitoring of the configuration in network devices.We develop additional rules and scripts to make it more usable.The reporting module could be a little easier to handle, as it requires quite some trial and error until you get the reports you want. Also, it would be great to have a graphical interface for the Network Intrusion Detection System's rule management.One area that has room for improvement is storage. AllienVault is a good place to put logs, but sometimes it's a tough place to go get logs... The logger can only hold so much data. If they improved that, that would help.Search performance can be slow. The Raw Logs feature is painfully slow. And if we're talking about the newer, the Anywhere product, you can't even schedule reports on the thing. There are probably a dozen other features I'd really like to see there, but that would be one of the biggies.We've had some stability problems, not a lot, but a few. Updates seem to be the worst. That seems to be when the stability problems come up.they seem to have bugs from time to time that go unfixed for a while and that is frustrating. I'm not saying the product needs to be bug-free, but they need to be responsive to bugs.

Read more »

The backup and recovery process for this solution needs improvement.Our customers are noticing configuration available in the GUI interface and I think that they should be equal.Does not have load-sharing or high-availability, and these are important things to implement. I can do the same things in another way, but not naturally having these features makes it complicated.If there is a configuration on the wrong side of the network or there are changes that result in harm to our IT infrastructure, the solution should immediately fix it.

Read more »

Pricing and Cost Advice
The upfront costs have increased, and we have been locked into this contract. The cost of changing over from it is way too high.The solution is fairly expensive, but in my experience, all of the SIEM applications that I've evaluated or looked at cost about the same.Licensing is very easy. Our CIO takes care of the billing, but in terms of price point, he hasn't complained, so it must be good.The pricing and licensing seem very reasonable. The managed service part of it feels like it gives me the equivalent of a full-time engineer for a lot less money. So, I feel it's a good value.

Read more »

Very low compared to commercial products that don't do much more.​The vulnerability management solution is worse than buying a Nessus Professional license.​So far, it has been a good solution for a tight budget.It allows you to do a lot with a small price tag... The pricing is the best on the market.It's very reasonably priced. It was one of the lowest among the ones I looked at. Licensing is pretty flexible. They can do a two-year or a three-year, even a one-year, perhaps.The pricing is a good value. The key thing is that for the new product, the licensing of it, is subscription-based and it's based on data. Clients need to be really careful when thinking about that, because odds are they're going to need to put a lot more data into it than what they initially estimate, which is going to drive their subscription costs up.I don't think the product's pricing is a good value because they try to raise the price 50 percent every year... AlienVault needs to understand that not all customers are huge enterprises... Their sales team is way too aggressive. The price they advertise is not always the price you get.So far, I feel the product's pricing is a good value. The technology is decent. You get what you pay for. I think it's fair.

Read more »

We bought the perpetual license, so we own the product, but there is a three-year support renewal fee for that.Please be cheaper and more simplified.

Read more »

report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
347,745 professionals have used our research since 2012.
Top Comparisons
Compared 37% of the time.
Compared 19% of the time.
Compared 22% of the time.
Compared 12% of the time.
Compared 10% of the time.
Also Known As
AlienVault, AlienVault USM, Alienvault Cybersecurity
Learn
Netsurion
AT&T
Fortinet
Overview

EventTracker by Netsurion delivers actionable security intelligence that empowers organizations of any size to effectively detect and respond to advanced threats.

EventTracker Security Center
EventTracker Security Center is one platform for all critical SIEM capabilities necessary for real-time security monitoring, advanced threat detection and response, and audit-ready compliance. With Security Center, you are able to quickly identify security threats, malware, unusual behavior and suspicious network traffic, and respond more effectively.

EventTracker SIEMphonic
EventTracker SIEMphonic is our Co-Managed SIEM service that functions as an extension of your team to strengthen defenses, respond in real-time, control costs, and optimize your team's abilities. EventTracker SIEMphonic is includes our own award-winning platform that has been included in the Gartner Magic Quadrant for SIEM for 11 consecutive years. Whether on-premise or in the cloud, our 24/7 ISO/IEC 27001-certified Security Operations Center (SOC) provides expertise so you can focus on the unique requirements of your organization.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and on-premises environments. USM Anywhere includes purpose-built cloud sensors that natively monitor your Amazon Web Services (AWS) and Microsoft Azure cloud environments. On premises, lightweight virtual sensors run on Microsoft Hyper-V and VMware ESXi to monitor your virtual private cloud and physical IT infrastructure.

With USM Anywhere, you can rapidly deploy sensors into your cloud and on-premises environments while centrally managing data collection, security analysis, and threat detection from the AlienVault Secure Cloud.

Five Essential Security Capabilities in a Single SaaS Platform

AlienVault USM Anywhere provides five essential security capabilities in a single SaaS solution, giving you everything you need for threat detection, incident response, and compliance management—all in a single pane of glass. With USM Anywhere, you can focus on finding and responding to threats, not managing software. An elastic, cloud-based security solution, USM Anywhere can readily scale to meet your threat detection needs as your hybrid cloud environment changes and grows.

  1. Asset Discovery
  2. Vulnerability Assessment
  3. Intrusion Detection
  4. Behavioral Monitoring
  5. SIEM

Try USM Anywhere in your environment—free for the first 14 days. 
www.alienvault.com/products/usm-anywhere/free-trial

FortiSIEM (formerly AccelOps 4) provides an actionable security intelligence platform to monitor security, performance and compliance through a single pane of glass.

Companies around the world use FortiSIEM for the following use cases:

  • Threat management and intelligence that provide situational awareness and anomaly detection
  • Alleviating compliance mandate concerns for PCI, HIPAA and SOX
  • Managing “alert overload”
  • Handling the “too many tools” reporting issue
  • Addressing the MSPs/MSSPs pain of meeting service level agreements
Offer
Learn more about EventTracker
Learn more about AT&T AlienVault USM
Learn more about Fortinet FortiSIEM (AccelOps)
Sample Customers
The Salvation Army, The FRESH Market, Pacific Western Bank, AAOS, Vanderbilt University, TalbotsAbel & Cole, Bank of Ireland, Bluegrass Cellular, CareerBuilder, Claire's, Hays Medical Center, Hope International, McCurrach, McKinsey & Company, Party Delights, Pepco Holdings, Richland School District, Ricoh, SaveMart, Shake Shack, Steelcase, TaxAct, Taylor Morrison, Vonage and ZoomFortiSIEM has hundreds of customers worldwide in markets including managed services, technology, financial services, healthcare, and government. Customers include Aruba Networks, Compushare, Port of San Diego, Cleveland Indians, Infoblox, Healthways, and Referentia.
Top Industries
VISITORS READING REVIEWS
Manufacturing Company28%
Financial Services Firm28%
Comms Service Provider24%
Insurance Company4%
REVIEWERS
Financial Services Firm21%
Healthcare Company17%
Comms Service Provider9%
University9%
VISITORS READING REVIEWS
Comms Service Provider17%
Healthcare Company14%
Financial Services Firm12%
University9%
REVIEWERS
Financial Services Firm10%
University10%
Energy/Utilities Company10%
Sports Company10%
Find out what your peers are saying about AT&T AlienVault USM vs. Fortinet FortiSIEM (AccelOps) and other solutions. Updated: May 2019.
347,745 professionals have used our research since 2012.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email