Compare DNIF vs. Securonix Security Analytics

DNIF is ranked 17th in Security Information and Event Management (SIEM) with 2 reviews while Securonix Security Analytics is ranked 4th in Security Information and Event Management (SIEM) with 10 reviews. DNIF is rated 7.0, while Securonix Security Analytics is rated 8.8. The top reviewer of DNIF writes "Powerful analytics and machine-learning enable us to find attack patterns". On the other hand, the top reviewer of Securonix Security Analytics writes "Spotter tool has helped us eliminate many hours required to manually create link analysis diagrams". DNIF is most compared with Splunk, IBM QRadar and ArcSight, whereas Securonix Security Analytics is most compared with Splunk, Exabeam and IBM QRadar.
Cancel
You must select at least 2 products to compare!
DNIF Logo
Read 2 DNIF reviews.
1,679 views|1,113 comparisons
Most Helpful Review
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM). Updated: March 2020.
408,459 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The solution is quite stable and offers good performance. It also works on a virtual machine. We haven't found any issues with it so far. It's been reliable.The response time on queries is super-fast.The User Behavior Analytics is a built-in threat-hunting feature. It detects and reports on any kind of malware or ransomware that enters the network.

Read more »

Customer support and making sure that we're successful has been one of the best features, one that we weren't even looking for during evaluation, but that's what we have found.I was looking for software as a service rather than having issues with managing hardware, upgrades, updates. I was trying to step away from that. Those were the key factors when looking at Securonix as a full-feature SIEM with next-generation capabilities available.The feature that I have found most valuable is their analytics platform where they have the open security data-link, which they introduced. This is typically different from the other vendors.The most valuable feature is being able to look at users' behavioral profiles to see what they typically access. One of the key events that we monitor is people's downloading of objects... It's very easy to see people's patterns, what they typically do.[The solution has] incident-management or case-management functionality. If someone were to download a high number and we decided we needed to investigate it, I could open a case right in the tool. It would be able to directly reference the data that they downloaded and we could open and shut the case directly in the tool, as well as report from it.One of the most valuable features it has is the thread chaining. One of the common issues that we always had was the number of anomalies that we used to get and the number of alerts that we used to get. But with this approach of thread chaining, we've found the false-positive rate has decreased very significantly. That was something that we never could have achieved before.When we were looking for products for our security monitoring needs, our biggest requirement was that we wanted something based on machine-learning and analytics. If you go with rules, it can raise a lot of noise. Securonix, with its UEBA capability, had the best analytics use-cases.The machine-learning algorithms are the most valuable feature because they're able to identify the 'needle in the haystack.'

Read more »

Cons
The vendor is fairly new and it's not as big as some of the international competitors. It's not a mature product. If you ask them to move data, it might take a lot of time.The solution should be able to connect to endpoints, such as desktops and laptops... If this solution had a smart connector to these logs- Windows, Linux, or any other logs - without affecting the performance of the connector, that would be wonderful.

Read more »

Some of the user experience when doing threat-hunting, such as being able to see multiple types of analytics from different log sources in one view, would be beneficial. Right now, there are some limitations around that.There is slight room for improvement in terms of the initial deployment. What I see is that Securonix is more focused on their product. They are expanding, in a big way, the number of customers. So there has to be a number of dedicated teams to jump on and speed up the deployment process.The pricing. I'm not sure how they are proceeding with the identity based pricing compared with DB pricing which most of the vendors are using today.We have a lot of users who, because they're engineers and they're bringing down product data - where, at times, a top-level product could be 10,000 or 15,000 objects - it's difficult for us to determine what should be a concern and what shouldn't be a concern. We work with the Securonix folks to try to come up with better ways to identify that.One of the things they can improve on a little bit is the usability side, to make some things simpler... The tool does have a lot of knobs, you can turn a lot of things on and off and you can change things. Sometimes, it can become a little overwhelming. They should remove some confirmation options and make it simpler for the less mature customers and people who are still trying to grasp it.We have compliance needs. We have investigation needs. And we have situations where an analyst needs to look at threats. These three things require a different view of how they look at the threats. What would be good is to have Securonix create three different views of their Security Command Center so that, depending on the persona of the person logging in, they'd get the relevant data they need and not see everything.There is room for improvement in the product's integration with ServiceNow and in the reporting features.Securonix implements risk scores based on different policies that are triggered. We've seen some challenges with the risk scores and how they trigger. These are things that Securonix has recognized and they've been working with us to help improve things.

Read more »

Pricing and Cost Advice
The pricing is based on the log size.

Read more »

We went in on a three-year agreement which has an annual licensing fee, based upon the number of people that we're monitoring. There have not been any additional costs to the standard licensing fees.We have a license from our 5.0, so that license just continued. We paid them the extra cloud-hosting costs for a year which were about $300,000.A good thing about Securonix is that they don't charge by volume of data or number of devices... They charge by the number of employees, which is a much more predictable number for me, versus data. Our costs are in the $100,000 range over a three-year subscription.We have an annual license. We pay $200,000 for the base licensing and we pay another $50,000 for the software as a service.

Read more »

report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
408,459 professionals have used our research since 2012.
Ranking
Views
1,679
Comparisons
1,113
Reviews
2
Average Words per Review
990
Avg. Rating
7.0
Views
5,925
Comparisons
3,198
Reviews
10
Average Words per Review
1,733
Avg. Rating
8.7
Top Comparisons
Compared 36% of the time.
Compared 21% of the time.
Compared 16% of the time.
Also Known As
Securonix
Learn
NETMONASTERY
Securonix Solutions
Overview

DNIF offers solutions to the world’s most challenging cybersecurity problems. Recognized by Gartner and used by some of the well-known global companies like PwC, Vodafone and Tata, this next generation analytics platform combines Security and Big Data Analytics to provide real-time threat detection and analytics to the most critical data assets on the Internet. With over a decade of experience in threat detection systems, DNIF has one of the fastest query response times and bridges the gap between searching, processing, analyzing and visualizing data thereby enabling companies with better SOC (Security Operations Center) management.

SNYPR is a next-generation security analytics platform that transforms big data into actionable security intelligence. Built on a Hadoop big data security lake, SNYPR combines an open data model, log management, security incident and event management (SIEM), user and entity behavior analytics (UEBA) and fraud detection into a complete, end-to-end platform that can be deployed in its entirety or in flexible, modular components.

Offer
Learn more about DNIF
Learn more about Securonix Security Analytics
Sample Customers
Vodafone India, IDEA Cellular, RBL Bank, NCDEX, NSEDtex SystemsPfizerWestern UnionHarrisITG
Top Industries
VISITORS READING REVIEWS
Comms Service Provider50%
Software R&D Company26%
Media Company6%
Manufacturing Company6%
VISITORS READING REVIEWS
Software R&D Company31%
Comms Service Provider13%
Financial Services Firm6%
Manufacturing Company6%
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM). Updated: March 2020.
408,459 professionals have used our research since 2012.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.