Art FaccioDirector Cyber Threat Intelligence at IGT
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"It's a per gigabyte cost for ingestion of data. For every gigabyte that you ingest, it's whatever you negotiated your price for. Compared to other contracts that we've had for cloud providers, it's significantly less."
"We have an OEM agreement with Devo. It is very similar to the standard licensing agreement because we are charged in the same way as any other customer, e.g., we use the backroom."
"We have seen ROI. We have seen cost savings in maintenance, upkeep, and support."
"I'm not involved in the financial aspect, but I think the licensing costs are similar to other solutions. If all the solutions have a similar cost, Devo provides more for the money."
"Devo is definitely cheaper than Splunk. There's no doubt about that. The value from Devo is good. It's definitely more valuable to me than QRadar or LogRhythm or any of the old, traditional SIEMs."
"[Devo was] in the ballpark with at least a couple of the other front-runners that we were looking at. Devo is a good value and, given the quality of the product, I would expect to pay more."
"We have a perpetual license, so the total cost of ownership is not very expensive. It's a good investment."
"Many clients are not able to purchase the packet capability because there is a huge amount of data, and the cost depends on the number of EPS (Events per second), as well as the number of gigabytes of data per day."
"Our license is for one year."
Earn 20 points
Devo is the only cloud-native logging and security analytics platform that releases the full potential of all your data to empower bold, confident action when it matters most. Only the Devo platform delivers the powerful combination of real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO crucial for monitoring and securing business operations as enterprises accelerate their shift to the cloud.
If you’re relying on log data to detect and prevent cyber threats, you’re in trouble. Attackers increasingly evade detection of log-centric security and network monitoring tools. But logs combined with full packet, endpoint NetFlow data are proven to provide the essential details for early threat detection. Here’s a closer look at our solution.
ThetaRay’s Industrial ThetaRay Asset Protection Cyber Solution (Industrial TAP-CyberTM) protects against unknown zero-day malware, targeted APT attacks, and sophisticated Stuxnet-like state sponsored cyber-attacks that target industrial critical infrastructure networks. Monitoring critical infrastructure networks and devices, such as various SCADA networks, aircrafts engines, medical equipment and more, the TAP-Cyber solution enables the real-time detection and actionable mitigation of unknown threats before any impact to production, safety or revenues can occur. ThetaRay’s non-intrusive industrial solution is deployed on-premises in a centralized location where it can access multi-site data collected by the customer (such as Historian data in the plant operating center), or locally protecting a specific site or entity (electrical utility
substation, offshore Oil&Gas site, water pumping site, commercial airplane etc.)
See how Devo allows you to free yourself from data management, and make machine data and insights accessible.
RSA NetWitness Logs and Packets (RSA SIEM) is ranked 7th in Security Information and Event Management (SIEM) with 11 reviews while ThetaRay is ranked 40th in Security Information and Event Management (SIEM). RSA NetWitness Logs and Packets (RSA SIEM) is rated 7.8, while ThetaRay is rated 0.0. The top reviewer of RSA NetWitness Logs and Packets (RSA SIEM) writes "Good support, powerful decoders and concentrator, but the dashboard is not reflecting events in real-time ". On the other hand, RSA NetWitness Logs and Packets (RSA SIEM) is most compared with Splunk, IBM QRadar, LogRhythm NextGen SIEM, RSA enVision and ArcSight Enterprise Security Manager (ESM), whereas ThetaRay is most compared with .
See our list of best Security Information and Event Management (SIEM) vendors.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.