Logsign vs ThetaRay

Logsign is ranked 27th in Security Information and Event Management (SIEM) vs ThetaRay which is ranked 25th in Security Information and Event Management (SIEM). Logsign is most compared with Splunk, IBM QRadar and AlienVault. ThetaRay is most compared with Splunk, IBM QRadar and ArcSight.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Use Logsign? Share your opinion.
Use ThetaRay? Share your opinion.
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM).
288,073 professionals have used our research since 2012.

Quotes From Members Comparing Logsign vs ThetaRay

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice
I don't think the product's pricing is a good value because they try to raise the price 50 percent every year... AlienVault needs to understand that not all customers are huge enterprises... Their sales team is way too aggressive. The price they advertise is not always the price you get.So far, I feel the product's pricing is a good value. The technology is decent. You get what you pay for. I think it's fair.​The vulnerability management solution is worse than buying a Nessus Professional license.​The ROI is quite good.Use an MSSP instead. It is much cheaper.We ran a few PoCs. The price and feature set were the best with AlienVault.Negotiate the best package for your environment.It has good pricing.

Read more »

Information Not Available
Information Not Available
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
288,073 professionals have used our research since 2012.
Top Comparisons
Top Comparisons
Compared 33% of the time.
Compared 17% of the time.
Compared 11% of the time.
See more AlienVault competitors »
Compared 27% of the time.
Compared 21% of the time.
Compared 20% of the time.
See more Logsign competitors »
Compared 50% of the time.
Compared 13% of the time.
Compared 13% of the time.
Also Known As
Also Known AsAlienVault Unified Security Management
Website/Video
Website/VideoAlienVault
Logsign
ThetaRay
Overview
Overview

Unified Security Management (USM) is AlienVault’s comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five core security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat detection, incident response, and compliance, in a single pane of glass. Designed to monitor cloud, hybrid cloud and on-premises environments, AlienVault USM significantly reduces complexity and reduces deployment time so that users can go from installation to first insight in minutes for the fastest threat detection.

The vendor says unlike traditional security point technologies, AlienVault Unified Security Management does the following:

o   Unifies essential security controls into a single all-in-one security monitoring solution

o   Monitors your cloud, hybrid cloud, and on-premises infrastructure

o   Delivers continuous threat intelligence to keep you aware of threats as they emerge and change

o   Provides comprehensive threat detection and actionable incident response directives

o   Deploys quickly, easily, and with minimal effort

o   Reduces TCO over traditional security solutions

As a next-gen, all-in-one SIEM solution, Logsign provides clear understanding of machine data and enables reliable, actionable insights in real time. Logsigns core features are Log and Event Data Centralization, Event Mapping, Real-Time Correlation and Historical and Real-Time Analysis. Deployment is easy, available within a week, and is scalable even in large organizations.

ThetaRay’s Industrial ThetaRay Asset Protection Cyber Solution (Industrial TAP-CyberTM) protects against unknown zero-day malware, targeted APT attacks, and sophisticated Stuxnet-like state sponsored cyber-attacks that target industrial critical infrastructure networks. Monitoring critical infrastructure networks and devices, such as various SCADA networks, aircrafts engines, medical equipment and more, the TAP-Cyber solution enables the real-time detection and actionable mitigation of unknown threats before any impact to production, safety or revenues can occur. ThetaRay’s non-intrusive industrial solution is deployed on-premises in a centralized location where it can access multi-site data collected by the customer (such as Historian data in the plant operating center), or locally protecting a specific site or entity (electrical utility

substation, offshore Oil&Gas site, water pumping site, commercial airplane etc.)

OFFER
Learn more about AlienVault
Learn more about Logsign
Learn more about ThetaRay
Sample Customers
Sample CustomersAbel & Cole, Bank of Ireland, Bluegrass Cellular, CareerBuilder, Claire's, Domino's, GameStop, Hays Medical Center, Hope International, McCurrach, McKinsey & Company, Party Delights, Pepco Holdings, Richland School District, Ricoh, SaveMart, Shake Shack, Steelcase, Subaru, TaxAct, US Air Force, Vonage, ZioskKoc, Philips, Istinye Park, SSM, Fox, Watsons, Deloitte, Sabanca University, OHL, Sompo Japan, Mitsubishi Electric, FerroliATM machines
Top Industries
Top Industries
REVIEWERS
Financial Services Firm
20%
Healthcare Company
18%
University
8%
Retailer
8%
VISITORS READING REVIEWS
Financial Services Firm
17%
Healthcare Company
14%
Comms Service Provider
9%
Marketing Services Firm
8%
No Data Available
No Data Available
Company Size
Company Size
REVIEWERS
Small Business
41%
Midsize Enterprise
33%
Large Enterprise
26%
VISITORS READING REVIEWS
Small Business
29%
Midsize Enterprise
34%
Large Enterprise
37%
No Data Available
No Data Available
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM).
Download now
288,073 professionals have used our research since 2012.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email