We performed a comparison between Elastic Security and VIPRE Endpoint Security based on real PeerSpot user reviews.
Find out what your peers are saying about Splunk, Datadog, Wazuh and others in Log Management."What customers found most valuable in Elastic Security feature-wise is the search capability, in particular, the way of writing the search query and the speed of searching for results."
"I can look at events from more than one source across multiple different locations and find patterns or anomalies. The machine learning capabilities are helpful, and I can create rules for notifications to be more proactive rather than responding after something has gone wrong."
"The cost is reasonable. It's not overly pricey."
"I like that it's a SIEM platform. I like that I can sell Elastic Security quickly. Elastic Security has a large community that can support users."
"It's not very complicated to install Elastic."
"The performance is good and it is faster than IBM QRadar."
"It's very stable and reliable."
"The most valuable feature of Elastic Security is that you can install agents, and they are not separately licensed."
"In general, it was pretty easy to manage."
"It has low overhead as far as machine resources are concerned. Everything runs faster with VIPRE installed versus some of the competitors. It has also been pretty easy to use. It just runs and gives us reports. It also sends us alerts when there is something that we need to look at. It does its job, and you just look at the reports. In other ways, you just forget that it is there."
"I would like more ways to manage permissions and restrict access to certain users."
"Elastic Security could improve the documentation. It would help if they were more simple and clean."
"This solution cannot do predictive maintenance, so we have to build our own modules for doing it."
"There isn't really a very good user experience. You need a lot of training."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"It is difficult to anticipate and understand the space utilization, so more clarity there would be great."
"We had issues with scalability. Logstash was not scaling and aggregation was getting delayed. We moved to Fluentd making our stack from ELK to EFK."
"It could use maybe a little more on the Linux side."
"We would get a lot of false positives and instead of them fixing the false positive, they would just want us to put in an exception, which I didn't care for."
"Their management interface is a little buggy. It requires a few system resources on the management interface. Its reporting can also be better. Overall, the reports are pretty good. They patch some third-party software, but if they can expand what they do for reporting and patch enterprise software, it would be handy."
Elastic Security is ranked 5th in Log Management with 58 reviews while VIPRE Endpoint Security is ranked 57th in EPP (Endpoint Protection for Business). Elastic Security is rated 7.6, while VIPRE Endpoint Security is rated 7.0. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of VIPRE Endpoint Security writes "Easy to deploy, good price, low overhead, and keeps our Servers and PC's free of virus'". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, Microsoft Defender for Endpoint and IBM Security QRadar, whereas VIPRE Endpoint Security is most compared with Microsoft Defender for Endpoint, Microsoft Defender for Business, SentinelOne Singularity Complete, CrowdStrike Falcon and Fortinet FortiEDR.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.