We performed a comparison between Elastic Security and N-able EDR based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Detection and Response (EDR)."The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"The product's initial setup phase is very easy."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"The product detects and blocks threats and is more proactive than firewalls."
"The most valuable features are the speed, detail, and visualization. It has the latest standards."
"The most valuable feature of Elastic Security is that you can install agents, and they are not separately licensed."
"We like Elastic Security because it's a REST API-based solution. That's the primary reason we use it."
"It is very quick to react. I can set it to check anomalies or suspicious behavior every 30 seconds. It is very fast."
"It is an extremely stable solution. Stability-wise, I rate the solution a ten out of ten."
"Elastic has a lot of beats, such as Winlogbeat and Filebeat. Beats are the agents that have to be installed on the terminals to send the data. When we install beats or Elastic agents on every terminal, they don't overload the terminals. In other SIEM solutions such as Splunk or QRadar, when beats or agents are installed on endpoints, they are very heavy for the terminals. They consume a lot of power of the terminals, whereas Elastic agents hardly consume any power and don't overload the terminals."
"Enables monitoring of application performance and the ability to predict behaviors."
"It's very stable and reliable."
"The most valuable features are the rollback feature, it's important for us. The AI models and are good."
"Detections could be improved."
"It takes about two business days for initial support, which is too slow in urgent situations."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"The SIEM could be improved."
"The solution is not stable."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"We'd like to see some more artificial intelligence capabilities."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"We are paying dearly for the guy who is working on the ELK Stack. That knowledge is quite rare and hard to come by. For difficulty and availability of resources, I would rate it a five out of 10."
"The setup process is complex. You need a solid working knowledge of networking, operating systems, and a little programming."
"This solution cannot do predictive maintenance, so we have to build our own modules for doing it."
"Elastic Security can be a bit difficult to use if a person only has experience in SMBs with tools like Zoho. The product can also be difficult for those who have never dealt with query language."
"They don't provide user authentication and authorisation features (Shield) as a part of their open-source version."
"We have a lot of false positives we see in the dashboard. I think this is the only problem we are facing."
Earn 20 points
Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 58 reviews while N-able EDR is ranked 56th in Endpoint Detection and Response (EDR). Elastic Security is rated 7.6, while N-able EDR is rated 0.0. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of N-able EDR writes "Stable, effective rollback feature, and useful AI models". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas N-able EDR is most compared with SentinelOne Singularity Complete, CrowdStrike Falcon, Check Point Harmony Endpoint, Cisco Secure Endpoint and ESET Inspect.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.