We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The pricing, if compared to other products, is cheap."
"The most valuable feature is the ability to write rules and triggers for network communication, and then being able to investigate based on that."
"It's fully scalable. There is no limit. Of course, the license limits per day the number of terabytes. In my opinion, it's very flexible."
"The most valuable features are the packet decoder, log decoder, and concentrator."
"The most valuable feature is that we can create our own connectors for any application, and NetWitness provides the training and tools to do it."
"The most valuable features are the integration and ease of use."
"Performance and reporting are very good."
"The most valuable features are the threat prediction and network forensics."
"The most valuable feature is the security that it provides."
"The management of the solution isn't as clear as it could be. They could adjust that to make it a better product."
"The system looks like it is a mix of a bunch of different systems, and nothing looked like it was quite together."
"They should implement algorithms to digest that data and produce additional, more advanced reporting, alerting and support of internal security teams."
"Log aggregation is an issue with this solution because there are a huge number of alerts in a single instance."
"The initial setup is very complex and should be simplified."
"The documentation is not as structured as I would like, personally, and I think that it can be improved and made much more user-friendly."
"The user interface is a little bit difficult for new users and it needs to be improved."
"Lots of competing products have vulnerability protection built into their products, and this solution would be improved by including that support."
"It is not so easy to customize this product."
"This is a pricey solution; it's not cheap."
"We have a perpetual license, so the total cost of ownership is not very expensive. It's a good investment."
"Many clients are not able to purchase the packet capability because there is a huge amount of data, and the cost depends on the number of EPS (Events per second), as well as the number of gigabytes of data per day."
"Our license is for one year."
Earn 20 points
ESET Dynamic Threat Defense provides another layer of security for ESET products like Mail Security and endpoint products by utilizing a cloud-based sandboxing technology to detect new, never before seen types of threats.
If you’re relying on log data to detect and prevent cyber threats, you’re in trouble. Attackers increasingly evade detection of log-centric security and network monitoring tools. But logs combined with full packet, endpoint NetFlow data are proven to provide the essential details for early threat detection. Here’s a closer look at our solution.
ESET Dynamic Threat Defense is ranked 12th in Advanced Threat Protection with 1 review while RSA NetWitness Logs and Packets (RSA SIEM) is ranked 3rd in Advanced Threat Protection with 10 reviews. ESET Dynamic Threat Defense is rated 9.0, while RSA NetWitness Logs and Packets (RSA SIEM) is rated 7.4. The top reviewer of ESET Dynamic Threat Defense writes "Good pricing, an easy installation process and excellent technical support". On the other hand, the top reviewer of RSA NetWitness Logs and Packets (RSA SIEM) writes "Good support, powerful decoders and concentrator, but the dashboard is not reflecting events in real-time ". ESET Dynamic Threat Defense is most compared with Fortinet FortiEDR and Kaspersky Sandbox, whereas RSA NetWitness Logs and Packets (RSA SIEM) is most compared with Splunk, IBM QRadar, LogRhythm NextGen SIEM, ArcSight Enterprise Security Manager (ESM) and RSA enVision.
See our list of best Advanced Threat Protection vendors.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.