ELK Logstash vs. Quest InTrust

ELK Logstash is ranked 10th in Log Management with 2 reviews vs Quest InTrust which is ranked 14th in Log Management with 1 review. The top reviewer of ELK Logstash writes "Stable, with good documentation, but needs better email notification". The top reviewer of Quest InTrust writes "Technical support is knowledgeable and quick to respond". ELK Logstash is most compared with Graylog, IBM QRadar and LogRhythm NextGen SIEM. Quest InTrust is most compared with Splunk, Change Auditor for Windows File Servers and Dell InTrust.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Use Quest InTrust? Share your opinion.
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Log Management.
291,379 professionals have used our research since 2012.

Quotes From Members Comparing ELK Logstash vs. Quest InTrust

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
AlientVault has helped us in improving our visualization and incident response during cybersecurity situations.Log-monitoring and alerting enable us to know when things happen that we need to know about.The dashboards are very descriptive and contain just the right amount of information. The activity alarms and events contain a plethora of data that is very descriptive and useful.AlienVault provides a checklist answer when using SIEM.I can easily check (in one place) all the logs and data in relation to attacks. It also gives me an overview if a server is not configured properly.Its powerful correlation engine helps reduce time in manually correlating events.The main menu: You can see everything there, what is happening on the servers, and in the logs, you can view more details of each event.It has allowed us to see what is happening on our servers.

Read more »

ELK documentation is very good, so never needed to contact technical support.

Read more »

​I would rate the technical support very well as they are knowledgeable and quick to respond​.

Read more »

Cons
Different functions to customize reports should be added.they seem to have bugs from time to time that go unfixed for a while and that is frustrating. I'm not saying the product needs to be bug-free, but they need to be responsive to bugs.The only room for improvement I can mention is the initial installation procedures. I found that the online installation instructions for the product were missing important details, they lacked necessary steps.We develop additional rules and scripts to make it more usable.Plugins could be better utilized, as some of them do not recognize all logs.It was easy on PoC, but when we got to the product it was different story. We had to learn the product again and got feeling that the PoC was a different product.The only complex area of the setup was writing the custom scripts.It should be able to communicate with other security solutions to stop threats.

Read more »

Email notification should be done the same way as Logentries does it.We set up a cron job to delete old logs so that we wouldn't hit a disk space issue. Such a feature should be available in the UI, where old logs can be deleted automatically. (Don’t know if this feature is already there).They don't provide user authentication and authorisation features (Shield) as a part of their open-source version.Authentication is not a default in Kibana. We need to have another tool to have authentication and authorization. These two should be part of Kibana.We had issues with scalability. Logstash was not scaling and aggregation was getting delayed. We moved to Fluentd making our stack from ELK to EFK.

Read more »

​It needs to have better reporting. ​​It was very complex. There was poor native correlation. ​

Read more »

Pricing and Cost Advice
I don't think the product's pricing is a good value because they try to raise the price 50 percent every year... AlienVault needs to understand that not all customers are huge enterprises... Their sales team is way too aggressive. The price they advertise is not always the price you get.So far, I feel the product's pricing is a good value. The technology is decent. You get what you pay for. I think it's fair.​The vulnerability management solution is worse than buying a Nessus Professional license.​The ROI is quite good.Use an MSSP instead. It is much cheaper.We ran a few PoCs. The price and feature set were the best with AlienVault.Negotiate the best package for your environment.It has good pricing.

Read more »

Information Not Available
Do a PoC. Make it detailed so it can help later.

Read more »

report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
291,379 professionals have used our research since 2012.
Top Comparisons
Top Comparisons
Compared 32% of the time.
Compared 17% of the time.
Compared 11% of the time.
See more AlienVault competitors »
Compared 44% of the time.
Compared 12% of the time.
See more ELK Logstash competitors »
Compared 55% of the time.
Compared 18% of the time.
Also Known As
Also Known AsAlienVault Unified Security ManagementElastic Stack, ELK Stack
Website/Video
Website/VideoAlienVault
Elastic
Quest Software
Overview
Overview

Unified Security Management (USM) is AlienVault’s comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five core security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat detection, incident response, and compliance, in a single pane of glass. Designed to monitor cloud, hybrid cloud and on-premises environments, AlienVault USM significantly reduces complexity and reduces deployment time so that users can go from installation to first insight in minutes for the fastest threat detection.

The vendor says unlike traditional security point technologies, AlienVault Unified Security Management does the following:

o   Unifies essential security controls into a single all-in-one security monitoring solution

o   Monitors your cloud, hybrid cloud, and on-premises infrastructure

o   Delivers continuous threat intelligence to keep you aware of threats as they emerge and change

o   Provides comprehensive threat detection and actionable incident response directives

o   Deploys quickly, easily, and with minimal effort

o   Reduces TCO over traditional security solutions

Logstash is an open source, server-side data processing pipeline that ingests data from a multitude of sources simultaneously, transforms it, and then sends it to your favorite “stash.”

InTrust is an event log management solution that addresses all of these concerns in heterogeneous environments composed of Windows, Unix and Linux servers, databases, business applications and network devices.

InTrust enables you to securely collect, store, search and analyze massive amounts of IT data from numerous data sources, systems and devices in one place. Get real-time insights into user activity for security, compliance and operational visibility.

OFFER
Learn more about AlienVault
Learn more about ELK Logstash
Learn more about Quest InTrust
Sample Customers
Sample CustomersAbel & Cole, Bank of Ireland, Bluegrass Cellular, CareerBuilder, Claire's, Domino's, GameStop, Hays Medical Center, Hope International, McCurrach, McKinsey & Company, Party Delights, Pepco Holdings, Richland School District, Ricoh, SaveMart, Shake Shack, Steelcase, Subaru, TaxAct, US Air Force, Vonage, ZioskSprint, Grab, Autopilot, Just Eat, Verizon Wireless, Green Man Gaming, Compare Group, Tango, Perceivant, QuizletPlatinum Bank
Top Industries
Top Industries
REVIEWERS
Financial Services Firm
20%
Healthcare Company
17%
Comms Service Provider
10%
Retailer
7%
VISITORS READING REVIEWS
Financial Services Firm
17%
Healthcare Company
14%
Comms Service Provider
9%
Marketing Services Firm
8%
No Data Available
No Data Available
Company Size
Company Size
REVIEWERS
Small Business
42%
Midsize Enterprise
32%
Large Enterprise
26%
VISITORS READING REVIEWS
Small Business
28%
Midsize Enterprise
34%
Large Enterprise
38%
No Data Available
No Data Available
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Log Management.
Download now
291,379 professionals have used our research since 2012.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email