Compare AT&T AlienVault USM vs. Rapid7 InsightIDR

AT&T AlienVault USM is ranked 4th in Security Information and Event Management (SIEM) with 33 reviews while Rapid7 InsightIDR is ranked 7th in Security Information and Event Management (SIEM) with 7 reviews. AT&T AlienVault USM is rated 8.8, while Rapid7 InsightIDR is rated 9.2. The top reviewer of AT&T AlienVault USM writes "The bundle of features is the killer feature, but search performance and Raw Logs are slow". On the other hand, the top reviewer of Rapid7 InsightIDR writes "Dashboards provide critical information at a glance, without hours of coding". AT&T AlienVault USM is most compared with Splunk, ELK Logstash and IBM QRadar, whereas Rapid7 InsightIDR is most compared with Splunk, Darktrace and AT&T AlienVault USM. See our AT&T AlienVault USM vs. Rapid7 InsightIDR report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about AT&T AlienVault USM vs. Rapid7 InsightIDR and other solutions. Updated: January 2020.
390,232 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The most valuable feature of this solution is security management for PCI DSS.This solution can identify many threats inside the organization (compromised endpoints, configuration issues), as well as "outside" threats (botnets, network scanners, web-attacks, etc).AlienVault provides a checklist answer when using SIEM.It provides a single pane of glass view, coupled with a whole security ecosystem. The ability to manage everything from a central point, including vulnerability assessments, asset management - including the services provided by the various hosts, NIDS, HIDS, etc. - provides a very efficient way of dealing with things.The IDS and the threat intelligence are very useful. They are very intuitive and data-rich.On any given day I could give you a different answer regarding the most valuable features of the product. The feature that is most important is the fact that it has a lot of features, that it's not just a log collection and correlation system, that it has a lot of other components built in. The bundle of features is really the killer feature.Log-monitoring and alerting enable us to know when things happen that we need to know about.The dashboards are very descriptive and contain just the right amount of information. The activity alarms and events contain a plethora of data that is very descriptive and useful.

Read more »

The web interface is great — very useful and user-friendly.The incident case management is the most valuable feature. Even though there's always something I find I would like to add to that feature, the ability to quickly sort through all the logs, network and endpoint data, etc., and add it to an incident case as part of the investigation, is nice. Having it automatically timeline that additional data into the original incident timeline, and correlate it to other notable events and activities on the network, results in a huge improvement in our overall confidence that we've quickly traced down the right source of an issue.The alerting to drive investigations and remediation has been its most valuable feature.​It improved my organization by building a security alerting program.​​User behavioral analytics allows us to pinpoint abnormal or suspicious behavior among millions of events every day.Log search allows us to dive deep into aggregated logs and query all event types at once.​The log aggregation and storage provided by InsightIDR has shown no issues with scalability; aggregating over one hundred millions events daily.InsightIDR has allowed us to find potential security issues that we did not know existed, and get remediation quickly.

Read more »

Cons
This solution could be easier to use.It would be nice to see some machine learning and monitoring of the configuration in network devices.We develop additional rules and scripts to make it more usable.The reporting module could be a little easier to handle, as it requires quite some trial and error until you get the reports you want. Also, it would be great to have a graphical interface for the Network Intrusion Detection System's rule management.One area that has room for improvement is storage. AllienVault is a good place to put logs, but sometimes it's a tough place to go get logs... The logger can only hold so much data. If they improved that, that would help.Search performance can be slow. The Raw Logs feature is painfully slow. And if we're talking about the newer, the Anywhere product, you can't even schedule reports on the thing. There are probably a dozen other features I'd really like to see there, but that would be one of the biggies.We've had some stability problems, not a lot, but a few. Updates seem to be the worst. That seems to be when the stability problems come up.they seem to have bugs from time to time that go unfixed for a while and that is frustrating. I'm not saying the product needs to be bug-free, but they need to be responsive to bugs.

Read more »

The interface for doing investigation needs to be enhanced with minor improvements that would make it more useful.The reporting is the weakest aspect. There needs to be multi-level grouping for events (for example, group by user and destination). Right now, we can do a group by user and a separate table or group by destination. But I'd be more interested in where a person was logging into instead of who was logging in or where he was logging in.Customised alert recipients need to be added to allow better first-line action and quicker response. Configurable honeypots would be a welcome addition.It would be useful to import threat intelligence in YARA format along with known incorrect email addresses.​I feel it would greatly benefit from more supported log sources.The ability to tune the collector for custom logs would greatly help.I would like the ability to adjust the threshold of certain existing alerts. Currently the only option is to change the notifications or create my own alert.One thing that springs to mind is easier API integration with ITSMs. We are evaluating a new ITSM and I would like to have InsightIDR create a ticket when an attack is identified, and the ticket would be closed in InsightIDR when the ITSM resolution is completed. This would take out the "single point of failure" we currently have, if the email recipient is somehow absent, in recording the risk appetite for the incident and the actions taken to mitigate or not.

Read more »

Pricing and Cost Advice
​The vulnerability management solution is worse than buying a Nessus Professional license.​So far, it has been a good solution for a tight budget.It allows you to do a lot with a small price tag... The pricing is the best on the market.It's very reasonably priced. It was one of the lowest among the ones I looked at. Licensing is pretty flexible. They can do a two-year or a three-year, even a one-year, perhaps.The pricing is a good value. The key thing is that for the new product, the licensing of it, is subscription-based and it's based on data. Clients need to be really careful when thinking about that, because odds are they're going to need to put a lot more data into it than what they initially estimate, which is going to drive their subscription costs up.I don't think the product's pricing is a good value because they try to raise the price 50 percent every year... AlienVault needs to understand that not all customers are huge enterprises... Their sales team is way too aggressive. The price they advertise is not always the price you get.So far, I feel the product's pricing is a good value. The technology is decent. You get what you pay for. I think it's fair.The ROI is quite good.

Read more »

Licensing is by endpoint and amount of retention time (at least ours is). Default retention was one year, but we are able to push the retention further if needed. There's also a provide-your-own-S3 option for longer retention if you don't want to pay for the additional retention years in your Rapid7 agreement.The pricing and licensing are competitive.​Accurately predict your licensing counts as this is a subscription based product.​The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.​Licensing is straightforward. If, for some reason, you don’t meet the minimum licensing requirements, there is a third-party managed service that can help.​I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.​

Read more »

report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
390,232 professionals have used our research since 2012.
Ranking
Views
21,858
Comparisons
12,709
Reviews
29
Average Words per Review
363
Avg. Rating
8.8
Views
5,888
Comparisons
2,724
Reviews
6
Average Words per Review
524
Avg. Rating
9.2
Top Comparisons
Compared 22% of the time.
Compared 10% of the time.
Compared 10% of the time.
Compared 19% of the time.
Compared 12% of the time.
Also Known As
AlienVault, AlienVault USM, Alienvault CybersecurityInsightIDR
Learn
AT&T
Rapid7
Overview

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and on-premises environments. USM Anywhere includes purpose-built cloud sensors that natively monitor your Amazon Web Services (AWS) and Microsoft Azure cloud environments. On premises, lightweight virtual sensors run on Microsoft Hyper-V and VMware ESXi to monitor your virtual private cloud and physical IT infrastructure.

With USM Anywhere, you can rapidly deploy sensors into your cloud and on-premises environments while centrally managing data collection, security analysis, and threat detection from the AlienVault Secure Cloud.

Five Essential Security Capabilities in a Single SaaS Platform

AlienVault USM Anywhere provides five essential security capabilities in a single SaaS solution, giving you everything you need for threat detection, incident response, and compliance management—all in a single pane of glass. With USM Anywhere, you can focus on finding and responding to threats, not managing software. An elastic, cloud-based security solution, USM Anywhere can readily scale to meet your threat detection needs as your hybrid cloud environment changes and grows.

  1. Asset Discovery
  2. Vulnerability Assessment
  3. Intrusion Detection
  4. Behavioral Monitoring
  5. SIEM

Try USM Anywhere in your environment—free for the first 14 days. 
www.alienvault.com/products/usm-anywhere/free-trial

Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.

Offer
Learn more about AT&T AlienVault USM
Learn more about Rapid7 InsightIDR
Sample Customers
Abel & Cole, Bank of Ireland, Bluegrass Cellular, CareerBuilder, Claire's, Hays Medical Center, Hope International, McCurrach, McKinsey & Company, Party Delights, Pepco Holdings, Richland School District, Ricoh, SaveMart, Shake Shack, Steelcase, TaxAct, Taylor Morrison, Vonage and ZoomLiberty Wines, Pioneer Telephone, Visier
Top Industries
REVIEWERS
Financial Services Firm22%
Healthcare Company17%
Comms Service Provider9%
University7%
VISITORS READING REVIEWS
Comms Service Provider17%
Software R&D Company15%
Media Company8%
Financial Services Firm7%
VISITORS READING REVIEWS
Software R&D Company26%
Comms Service Provider10%
Manufacturing Company8%
Financial Services Firm8%
Company Size
REVIEWERS
Small Business51%
Midsize Enterprise27%
Large Enterprise22%
VISITORS READING REVIEWS
Small Business45%
Midsize Enterprise14%
Large Enterprise40%
REVIEWERS
Small Business14%
Midsize Enterprise57%
Large Enterprise29%
Find out what your peers are saying about AT&T AlienVault USM vs. Rapid7 InsightIDR and other solutions. Updated: January 2020.
390,232 professionals have used our research since 2012.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.