Most Helpful Review
AlientVault has helped us in improving our visualization and incident response during cybersecurity situations.
Log-monitoring and alerting enable us to know when things happen that we need to know about.
The dashboards are very descriptive and contain just the right amount of information. The activity alarms and events contain a plethora of data that is very descriptive and useful.
AlienVault provides a checklist answer when using SIEM.
I can easily check (in one place) all the logs and data in relation to attacks. It also gives me an overview if a server is not configured properly.
Its powerful correlation engine helps reduce time in manually correlating events.
The main menu: You can see everything there, what is happening on the servers, and in the logs, you can view more details of each event.
It has allowed us to see what is happening on our servers.
Real-time UDP/GELF logging and full text-based searching.
UDP is a fast and lightweight protocol, perfect for sending large volumes of logs with minimal overhead.
Storing logs in Elasticsearch means log retrieval is extremely fast, and full text search is available by default.
We run a containerized microservices environment. Being able to set up streams and search for errors and anomalies across hundreds of containers is why a log aggregation platform like Graylog is valuable to us.
Allowing us to set up alerts and integrate with platforms we already use, such as Slack and OpsGenie to alert users of these errors proactively, is also a very useful feature.
It is used as a log manager/SIEM. It provides visibility into the infrastructure and security related events.
The build is stable and requires little maintenance, even compared to some extremely expensive products.
We have scaled from a single machine installation (a VM with a Graylog + ES + MongoDB) to (2 Graylog + 2 ES + 3 MongoDB). This was done smoothly with a minimal impact on logging.
The daily alerts allow me to quickly find security and operations issues which need to be addressed.
LogRhythm has shown to us, to this point in time, that it has the capabilities of being able to deliver actionable intelligence to the security engineers and analysts.
The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources.
The ability for me to go into the Web UI, and just learn what's going on in my environment.
It gives us insight into our entire installation, where we are multiple sites, going as far as the East Coast to the Central West Coast.
Provides visibility into the network.
It supports most standard log sources.
As a healthcare company, what we use it for is compliance, then to protect our data from exaltation.
Different functions to customize reports should be added.
they seem to have bugs from time to time that go unfixed for a while and that is frustrating. I'm not saying the product needs to be bug-free, but they need to be responsive to bugs.
The only room for improvement I can mention is the initial installation procedures. I found that the online installation instructions for the product were missing important details, they lacked necessary steps.
We develop additional rules and scripts to make it more usable.
Plugins could be better utilized, as some of them do not recognize all logs.
It was easy on PoC, but when we got to the product it was different story. We had to learn the product again and got feeling that the PoC was a different product.
The only complex area of the setup was writing the custom scripts.
It should be able to communicate with other security solutions to stop threats.
More complex visualizations and the ability to execute custom Elasticsearch queries would be great.
With technical support, you are on your own without an enterprise license.
Elasticsearch recommendations for tuning could be better. Graylog doesn't have direct support for running the system inside of Kubernetes, so it can be challenging to fill in the gaps and set up containers in a way that is both performant and stable.
We ran into problems with Elasticsearch throwing a circuit-breaking exception due to field data size being too large. It turned out that the heap size directly impacted this size in a high-throughput environment, causing unexplained instability in Graylog. We were able to troubleshoot on the Elasticsearch size, but we should have been able to reference some minimum requirements for Graylog to know that our settings weren't sufficient.
Since container orchestration systems are popular and Graylog fits the niche well, perhaps they could officially support running in docker containers on Kubernetes as a StatefulSet as a use case. That way, the declarative nature of Kubernetes config files would document their best case deployment scenario-
Dashboards, stream alerts and parsing could be improved.
Over six months, I had two similar issues where searches were performed on field "messages". It exhausted all the memory of the ES node causing an ES crash and a Graylog halt.
There should be some user groups and an auto sign-in feature.
More detail in the alerts given to avoid additional searches, as often the source or destination associated with the alert is not evidenced.
Right now there is the concern about being able to gather all of the data into the system.
I think they probably need to, because a lot of companies are having this cloud-first strategy, where anything that's new has to go into the cloud for some reason.
I have probably submitted half a dozen log parser requests, and I keep finding more stuff that we need to keep an eye on that doesn't have a definition in LogRhythm.
I would really love to be able to take some of the data and not have to export it to a CSV file, so I can pull it into Excel to turn it into some other kind of graph.
I would probably look for more things to go into the web console that is currently on the fat client.
It will definitely help if the parsing side would be much easier, meaning it would be better if we could easily make adjustments on the parser, both on standard and non-standard log sources.
In the next release, I would certainly like to see more HIPAA compliance. I would also like to see more integration with Palo Alto Networks, particularly their Traps, which is their endpoint solution.
Pricing and Cost Advice
I don't think the product's pricing is a good value because they try to raise the price 50 percent every year... AlienVault needs to understand that not all customers are huge enterprises... Their sales team is way too aggressive. The price they advertise is not always the price you get.
So far, I feel the product's pricing is a good value. The technology is decent. You get what you pay for. I think it's fair.
The vulnerability management solution is worse than buying a Nessus Professional license.
The ROI is quite good.
Use an MSSP instead. It is much cheaper.
We ran a few PoCs. The price and feature set were the best with AlienVault.
Negotiate the best package for your environment.
It has good pricing.
You get a lot out-of-the-box with the non-enterprise version, so give it a try first.
Consider Enterprise support if you have atypical needs or setup requirements.
If you want something that works and do not have the money for Splunk or QRadar, take Graylog.
I am using a community edition. I have not looked at the enterprise offering from Graylog.
Having paid official support is wise for projects.
I would recommend talking to the rep. That's the biggest thing because they will know what questions to ask.
Look for whatever will give you the most value. That's the main point. It is not one size fits all.
If you don't have your staff, absolutely look into the co-pilot and factor that into your cost evaluation.
I would recommend that whatever sales quotes to them upfront, they will probably go up. Because they are probably going to outgrow that very quickly or once they start getting everything into it, they are going to have to move up anyway.
Look closely at the cost of licensing of other products. This should include setups and the need for support services. I did a RFQ to 2 other vendors before choosing this product.
Compared 32% of the time.
Compared 17% of the time.
See more AlienVault competitors »
Compared 11% of the time.
Compared 51% of the time.
Compared 27% of the time.
See more Graylog competitors »
Compared 6% of the time.
Compared 47% of the time.
Compared 14% of the time.
Compared 12% of the time.
Also Known As
|Also Known As||AlienVault Unified Security Management||Graylog2||LogRhythm, LogRhythm Threat Lifecycle Management, LogRhythm TLM|
Unified Security Management (USM) is AlienVault’s comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five core security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat detection, incident response, and compliance, in a single pane of glass. Designed to monitor cloud, hybrid cloud and on-premises environments, AlienVault USM significantly reduces complexity and reduces deployment time so that users can go from installation to first insight in minutes for the fastest threat detection.
The vendor says unlike traditional security point technologies, AlienVault Unified Security Management does the following:
o Unifies essential security controls into a single all-in-one security monitoring solution
o Monitors your cloud, hybrid cloud, and on-premises infrastructure
o Delivers continuous threat intelligence to keep you aware of threats as they emerge and change
o Provides comprehensive threat detection and actionable incident response directives
o Deploys quickly, easily, and with minimal effort
o Reduces TCO over traditional security solutions
LogRhythm, a leader in security intelligence and analytics, empowers organizations with it's Threat Lifecycle Management Platform, which provides a complete, end-to-end workflow for detecting, investigating and responding to cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network/endpoint forensics, and advanced security analytics.
In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.
Learn more about AlienVault
Learn more about Graylog
Learn more about LogRhythm NextGen SIEM
|Sample Customers||Abel & Cole, Bank of Ireland, Bluegrass Cellular, CareerBuilder, Claire's, Domino's, GameStop, Hays Medical Center, Hope International, McCurrach, McKinsey & Company, Party Delights, Pepco Holdings, Richland School District, Ricoh, SaveMart, Shake Shack, Steelcase, Subaru, TaxAct, US Air Force, Vonage, Ziosk||Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur||Macy's, NASA, Fujitsu, US Air Force, EY, Abbott, HD Supply, SAB Miller, UCLA, Raytheon, Amtrak, Cargill|
VISITORS READING REVIEWS
No Data Available
VISITORS READING REVIEWS
VISITORS READING REVIEWS
No Data Available
VISITORS READING REVIEWS