Auditor vs Securonix Next-Gen SIEM comparison

Cancel
You must select at least 2 products to compare!
Broadcom Logo
254 views|237 comparisons
Securonix Solutions Logo
5,103 views|2,734 comparisons
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "We have an annual license. We pay $200,000 for the base licensing and we pay another $50,000 for the software as a service."
  • "A good thing about Securonix is that they don't charge by volume of data or number of devices... They charge by the number of employees, which is a much more predictable number for me, versus data. Our costs are in the $100,000 range over a three-year subscription."
  • "We have a license from our 5.0, so that license just continued. We paid them the extra cloud-hosting costs for a year which were about $300,000."
  • "We went in on a three-year agreement which has an annual licensing fee, based upon the number of people that we're monitoring. There have not been any additional costs to the standard licensing fees."
  • "I had heard that it was much cheaper than Splunk and some of the other tools, and they gave us a nice package with support. They accommodated the number of users and support very well."
  • "Its pricing is quite similar to others and is very competitive. The other solutions have different types of licensing, but when you do the math, it is competitive."
  • "Its price is fine. We found it to be cheaper than LogRhythm, Exabeam, Splunk, as well as Elastic Security. A few months ago, when we were comparing Securonix with Elastic Security, we found Securonix to be cheaper than Elasticsearch. We were pretty surprised that Elastic Security is more expensive than Securonix because Elasticsearch is just starting, and it cannot compete with Securonix at this time. So, the pricing of Securonix is pretty good for now."
  • "The pricing is fine compared to the market but I think that at some point the competitors will catch up on price."
  • More Securonix Next-Gen SIEM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Mainframe Security solutions are best for your needs.
    765,234 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:CA Auditor can be instrumental in helping users ensure compliance with various regulations. It enables users to monitor critical events such as failed logon attempts, privileged user actions, and… more »
    Top Answer:CA Auditor provides organizations with the flexibility to customize audit policies, which has been instrumental in maintaining regulatory compliance. The solution offers a range of configuration… more »
    Top Answer:CA Auditor has proven to be a valuable tool for conducting digital forensics investigations on users' mainframes. The solution allows users to perform detailed forensic analysis by providing a… more »
    Top Answer:In my market, a lot of financial companies had or have an ArcSight installation. Just because in former times it was pretty good. Now a lot of them are looking for a more effective solution due to… more »
    Top Answer:We can customize our use cases with the tools provided by Securonix. It is an excellent tool that can ingest data in different ways and is very flexible.
    Top Answer:The pricing is fine compared to the market but I think that at some point the competitors will catch up on price. It would be good if, for example, there were an option to offer customers who have… more »
    Ranking
    5th
    out of 12 in Mainframe Security
    Views
    254
    Comparisons
    237
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    5,103
    Comparisons
    2,734
    Reviews
    14
    Average Words per Review
    1,113
    Rating
    9.0
    Comparisons
    Also Known As
    CA Auditor, CA Auditor for z/OS
    Securonix Security Analytics
    Learn More
    Overview

    CA Auditor for z/OS (CA Auditor) is a powerful mainframe tool architected to help you achieve and maintain compliance with the myriad regulatory requirements that govern your business and IT systems. It enables you to perform an automated technical review of the system, hardware and software environment and to identify integrity exposures in z/OS. CA Auditor is designed to help you simplify auditing activities and eliminate manual processes so that users without in-depth experience can perform an extensive operating system review.

    Auditor helps organizations ensure the security, integrity, and regulatory compliance of their mainframe environments. It provides comprehensive auditing capabilities that monitor and track user activity, system changes, and data access on the mainframe. By analyzing and reporting on these activities, Auditor helps organizations detect and respond to security threats, identify compliance violations, and investigate potential breaches or unauthorized activities.

    Auditor Features

    Auditor offers the following features:

    • Comprehensive Auditing: CA Auditor provides extensive auditing capabilities to monitor and track user activities, system changes, and data access on the mainframe.

    • Real-time Monitoring and Alerting: It offers real-time monitoring of critical events, allowing users to receive alerts and notifications when specific security incidents or policy violations occur.

    • Customizable Audit Policies: Users can define and customize audit policies based on their specific security and compliance requirements. This allows them to focus on the areas that are most critical to their organization.

    • Compliance Reporting: CA Auditor offers a wide range of pre-defined compliance reports that help users demonstrate adherence to regulatory requirements such as PCI DSS, HIPAA, SOX, and GDPR. Reports can then be customized and scheduled for automatic generation.

    • Forensic Analysis: The solution includes powerful search and analysis capabilities that enable users to perform detailed forensic investigations. This helps in identifying the root cause of security incidents and understanding the full scope of unauthorized activities.

    • Audit Trail Archiving and Retention: CA Auditor allows users to archive and retain audit trail data for long-term storage and compliance purposes. This ensures that historical audit information is available for future analysis and audit reviews.

    • Integration with SIEM Solutions: The solution can integrate with Security Information and Event Management (SIEM) systems, allowing users to consolidate and correlate mainframe audit data with data from other IT systems.

    • Role-Based Access Control: Users can define access controls and assign roles to ensure that only authorized personnel have access to sensitive audit data and system configurations.

    • Interactive Query Interface: CA Auditor offers an interactive query interface that allows users to perform ad-hoc searches and queries on the audit data, providing flexibility in analyzing specific events or patterns of activity.

    • Audit Data Visualization: The solution includes visual representation capabilities, such as charts and graphs, to present audit data in a more intuitive and easily understandable format. This helps in identifying trends, anomalies, and patterns quickly.

    • Support for Mainframe Environment: CA Auditor is specifically designed for IBM's z/OS operating system, ensuring compatibility and optimized performance in mainframe environments.

    Auditor Benefits

    Some of the benefits that Auditor provides are:

    • Enhanced security and compliance

    • Comprehensive monitoring and tracking of user activities

    • Real-time alerts for security incidents

    • Customizable audit policies

    • Pre-defined compliance reporting

    • Powerful forensic analysis capabilities

    • Integration with SIEM solutions

    • Role-based access control

    • Interactive query interface

    • Visual representation of audit data

    Securonix Security Analytics SNYPR is a next-generation security analytics platform that transforms big data into actionable security intelligence, enabling you to take care of so much more than simply your SIEM (security information and event management) needs. In addition, it contains all of the tools that you may need to enable your organization to successfully handle both log management as well as UEBA (user and entity behavior analytics)-related tasks. The SNYPR management platform gives users the ability to combine security orchestration, automation, and response, security information and event management, network traffic analysis, and user and entity behavior analytics. This single technical environment does away with your need for multiple security, management, and analytics solutions.

    Securonix Security Analytics SNYPR’s unified platform can be scaled up to handle up to one million security events every second. While this load may seem heavy, SNYPR handles it with ease. It is able to reduce incidents of false security positives by 60%. The access certification workload that IT administrators and managers need to deal with can be reduced by as much as 90%.

    The model that this platform uses is based on a machine learning algorithm. This model gives Securonix Security Analytics’s SNYPR platform a number of extremely valuable capabilities. The platform gathers many different types of data and applies what it learns to threats as they arise. The system assigns threats risk values to determine where the areas of highest need are. Machine learning also allows you to respond to slow acting threats by using historical data to inform your response.

    All of the data that the system gathers is stitched together and used to create a complete picture of the risks that the system faces. Any blind spots that may exist are exposed by the collaborative UI that compiles the system data in a single location. This also increases your ability to monitor advanced application threats. 

    Key Features

    Some of Securonix Security Analytics’s SNYPR platform’s key features include:

    • The ability to enrich all data that the SNYPR platform collects. When SNYPR gathers information, it applies relevant data which can be used in the future to gauge whether or not a particular event is a threat.
    • The ability for data redundancy to automatically take place. All of the data that is gathered, analyzed, and processed by SNYPR is automatically copied and distributed across the system. If there is a failure in any particular part of the system, the information will still be preserved.
    • The ability to track historical issues and use that information to help deal with current threats. The SPOTTER feature allows analysts to look back at both old data and the contextual information that is attached to it. They can then use that data to inform their responses to similar threats that they are currently dealing with.

    Reviews from Real Users

    Securonix Security Analytics SNYPR platform stands out among its competitors for a number of reasons. Two major ones are its ability to significantly reduce the number of false positives that administrators have to deal with and the way that it incorporates contextual information into security events to reduce the time spent finding solutions to problems that arise.

    Peerspot users note the effectiveness of these features. One user wrote, “Securonix’s analytics-driven approach for helping to find sophisticated threats and reduce false positives is pretty good. We are allowed to fine-tune according to our requirements and our clients' requirements, which does reduce false positives. In the last 24 hours, the total number of policies with triggers was 233. When I started with this product, the false positives were 561. Therefore, the solution has helped by tuning or reducing false positives.”

    Another user noted, “The way that a Securonix is able to put a lot of the contextual information into the events is very helpful. That has reduced the amount of time required for investigating, ‘Hey, this might be something I need to look at,’ and then doing further research. It puts all of those violations in one event or case, so that you can look at different types of violations that all correlate. That has reduced the amount of time for researching some of those cases. It's dependent upon the scenario, but in some cases it could save an hour of going out and doing a bunch of individual searches.”

    Sample Customers
    Information Not Available
    Dtex Systems Pfizer Western Union Harris ITG
    Top Industries
    No Data Available
    REVIEWERS
    Financial Services Firm22%
    Computer Software Company22%
    Manufacturing Company11%
    Pharma/Biotech Company11%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm12%
    Government7%
    Manufacturing Company6%
    Company Size
    No Data Available
    REVIEWERS
    Small Business22%
    Midsize Enterprise19%
    Large Enterprise59%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise15%
    Large Enterprise61%

    Auditor is ranked 5th in Mainframe Security while Securonix Next-Gen SIEM is ranked 7th in Security Information and Event Management (SIEM) with 27 reviews. Auditor is rated 0.0, while Securonix Next-Gen SIEM is rated 8.6. On the other hand, the top reviewer of Securonix Next-Gen SIEM writes "Spotter tool has helped us eliminate many hours required to manually create link analysis diagrams". Auditor is most compared with IBM Security zSecure, whereas Securonix Next-Gen SIEM is most compared with IBM Security QRadar, Splunk Enterprise Security, Microsoft Sentinel, LogRhythm SIEM and Exabeam Fusion SIEM.

    We monitor all Mainframe Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.