Most Helpful Review
Enables us to bring all our data sources into a central hub for quick analysis, helping us focus on priorities in our...
Use IBM Watson for Cyber Security? Share your opinion.
Find out what your peers are saying about IBM Watson for Cyber Security vs. RSA NetWitness Logs and Packets (RSA SIEM) and other solutions. Updated: January 2021.
455,962 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Being able to build and modify dashboards on the fly with Activeboards streamlines my analyst time because my analysts aren't doing it across spreadsheets or five different tools to try to build a timeline out themselves. They can just ingest it all, build a timeline out across all the logging, and all the different information sources in one dashboard. So, it's a huge time saver. It also has the accuracy of being able to look at all those data sources in one view. The log analysis, which would take 40 hours, we can probably get through it in about five to eight hours using Devo."
"Even if it's a relatively technical tool or platform, it's very intuitive and graphical. It's very appealing in terms of the user interface. The UI has a graphically interface with the raw data in a table. The table can be as big as you want it, depending on your use case. You can easily get a report combining your data, along with calculations and graphical dashboards. You don't need a lot of training, because the UI is relatively very intuitive."
"The ability to have high performance, high-speed search capability is incredibly important for us. When it comes to doing security analysis, you don't want to be doing is sitting around waiting to get data back while an attacker is sitting on a network, actively attacking it. You need to be able to answer questions quickly. If I see an indicator of attack, I need to be able to rapidly pivot and find data, then analyze it and find more data to answer more questions. You need to be able to do that quickly. If I'm sitting around just waiting to get my first response, then it ends up moving too slow to keep up with the attacker. Devo's speed and performance allows us to query in real-time and keep up with what is actually happening on the network, then respond effectively to events."
"The real-time analytics of security-related data are super. There are a lot of data feeds going into it and it's very quick at pulling up and correlating the data and showing you what's going on in your infrastructure. It's fast. The way that their architecture and technology works, they've really focused on the speed of query results and making sure that we can do what we need to do quickly. Devo is pulling back information in a fast fashion, based on real-time events."
"The user interface is really modern. As an end-user, there are a lot of possibilities to tailor the platform to your needs, and that can be done without needing much support from Devo. It's really flexible and modular. The UI is very clean."
"One of the biggest features of the UI is that you see the actual code of what you're doing in the graphical user interface, in a little window on the side. Whatever you're doing, you see the code, what's happening. And you can really quickly switch between using the GUI and using the code. That's really useful."
"IBM Watson for Cyber Security is very stable."
"The most valuable feature of this product is innovation, where the research and upgrading of technology never ends."
"The customer support is very good."
"Their technical support responds quickly and are knowledgable."
"The most valuable features are its ingestion of logs and raising of alerts based on those logs."
"The most valuable feature is the ability to write rules and triggers for network communication, and then being able to investigate based on that."
"It's fully scalable. There is no limit. Of course, the license limits per day the number of terabytes. In my opinion, it's very flexible."
"The most valuable features are the packet decoder, log decoder, and concentrator."
"The most valuable feature is that we can create our own connectors for any application, and NetWitness provides the training and tools to do it."
"The most valuable features are the integration and ease of use."
"Performance and reporting are very good."
"Their documentation could be better. They are growing quickly and need to have someone focused on tech writing to ensure that all the different updates, how to use them, and all the new features and functionality are properly documented."
"There's always room to reduce the learning curve over how to deal with events and machine data. They could make the machine data simpler."
"There is room for improvement in the ability to parse different log types. The breadth of overall log parsers that exists right now is an area that they could improve. Natively, there's more that could be done by Devo then what it can and can't understand from a parsing perspective."
"Devo has a lot of cloud connectors, but they need to do a little bit of work there. They've got good integrations with the public cloud, but there are a lot of cloud SaaS systems that they still need to work with on integrations, such as Salesforce and other SaaS providers where we need to get access logs."
"The Activeboards feature is not as mature regarding the look and feel. Its functionality is mature, but the look and feel is not there. For example, if you have some data sets and are trying to get some graphics, you cannot change anything. There's just one format for the graphics. You cannot change the size of the font, the font itself, etc."
"They need to continue to build the AI capabilities."
"This is an expensive product, so making it more cost-effective would be an improvement."
"In the future, I would like to see threat intelligence included."
"The initial setup was complex because it takes a lot of time to complete the implementation."
"I'd like to see improvement in its ease of use. It's basically unusable. It's overly complex."
"The system looks like it is a mix of a bunch of different systems, and nothing looked like it was quite together."
"They should implement algorithms to digest that data and produce additional, more advanced reporting, alerting and support of internal security teams."
"Log aggregation is an issue with this solution because there are a huge number of alerts in a single instance."
"The initial setup is very complex and should be simplified."
"The documentation is not as structured as I would like, personally, and I think that it can be improved and made much more user-friendly."
"The user interface is a little bit difficult for new users and it needs to be improved."
Pricing and Cost Advice
"It's a per gigabyte cost for ingestion of data. For every gigabyte that you ingest, it's whatever you negotiated your price for. Compared to other contracts that we've had for cloud providers, it's significantly less."
"We have an OEM agreement with Devo. It is very similar to the standard licensing agreement because we are charged in the same way as any other customer, e.g., we use the backroom."
"We have seen ROI. We have seen cost savings in maintenance, upkeep, and support."
"I'm not involved in the financial aspect, but I think the licensing costs are similar to other solutions. If all the solutions have a similar cost, Devo provides more for the money."
"The price of this solution should be lower, although I understand why IBM charges a premium price."
"The licenses are good but the cost is very expensive."
"This is a pricey solution; it's not cheap."
"We have a perpetual license, so the total cost of ownership is not very expensive. It's a good investment."
"Many clients are not able to purchase the packet capability because there is a huge amount of data, and the cost depends on the number of EPS (Events per second), as well as the number of gigabytes of data per day."
"Our license is for one year."
Questions from the Community
Top Answer: Even if it's a relatively technical tool or platform, it's very intuitive and graphical. It's very appealing in terms of… more »
Top Answer: We have an OEM agreement with Devo. It is very similar to the standard licensing agreement because we are charged in the… more »
Ask a question
Earn 20 points
Top Answer: Performance and reporting are very good.
Top Answer: The user interface is a little bit difficult for new users and it needs to be improved. It takes a lot of time to… more »
Top Answer: I am currently working in a security operations center and RSA NetWitness Log and Packets is part of our security… more »
Compared 54% of the time.
Compared 18% of the time.
Compared 9% of the time.
Compared 5% of the time.
Compared 4% of the time.
Compared 80% of the time.
Compared 20% of the time.
Compared 20% of the time.
Compared 18% of the time.
Compared 8% of the time.
Compared 8% of the time.
Compared 6% of the time.
Also Known As
|Logtrust||RSA Security Analytics|
Devo, the cloud-native logging and security analytics company, empowers security and operations teams to maximize the value of all their data. Only the Devo platform delivers the powerful combination of real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO crucial for monitoring and securing business operations as enterprises accelerate their shift to the cloud.
|Watson for cyber security can draw security intelligence from millions of security blogs, online forums and white papers - so you can see threats unseen by other systems.|
If you’re relying on log data to detect and prevent cyber threats, you’re in trouble. Attackers increasingly evade detection of log-centric security and network monitoring tools. But logs combined with full packet, endpoint NetFlow data are proven to provide the essential details for early threat detection. Here’s a closer look at our solution.
See Devo in Action
See how Devo allows you to free yourself from data management, and make machine data and insights accessible.
Learn more about IBM Watson for Cyber Security
Learn more about RSA NetWitness Logs and Packets (RSA SIEM)
|United States Air Force, Rubrik, Critical Start, NHL, Panda Security, Telefonica, CaixaBank, OpenText|
Information Not Available
|Los Angeles World Airports, Reply|
Computer Software Company27%
Comms Service Provider24%
Financial Services Firm6%
No Data Available
Comms Service Provider33%
Financial Services Firm33%
Computer Software Company22%
Computer Software Company36%
Comms Service Provider22%
Financial Services Firm5%
No Data Available
IBM Watson for Cyber Security is ranked 24th in Security Information and Event Management (SIEM) with 3 reviews while RSA NetWitness Logs and Packets (RSA SIEM) is ranked 10th in Security Information and Event Management (SIEM) with 12 reviews. IBM Watson for Cyber Security is rated 8.0, while RSA NetWitness Logs and Packets (RSA SIEM) is rated 7.0. The top reviewer of IBM Watson for Cyber Security writes "An innovative and stable product that is well maintained and always up-to-date". On the other hand, the top reviewer of RSA NetWitness Logs and Packets (RSA SIEM) writes "Good support, powerful decoders and concentrator, but the dashboard is not reflecting events in real-time ". IBM Watson for Cyber Security is most compared with Splunk and IBM QRadar, whereas RSA NetWitness Logs and Packets (RSA SIEM) is most compared with IBM QRadar, Splunk, ArcSight Enterprise Security Manager (ESM), LogRhythm NextGen SIEM and RSA enVision. See our IBM Watson for Cyber Security vs. RSA NetWitness Logs and Packets (RSA SIEM) report.
See our list of best Security Information and Event Management (SIEM) vendors.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.