ArcSight Enterprise Security Manager (ESM) and Google Chronicle Suite are leading security information and event management solutions. Users are generally more satisfied with Google Chronicle Suite due to its scalability and innovative features, while ArcSight ESM is preferred for its robust threat detection.
Features: ArcSight ESM is known for advanced correlation, comprehensive threat detection, and detailed threat analysis. Google Chronicle Suite stands out for its scalability, rapid processing, and integration capabilities.
Room for Improvement: ArcSight ESM needs a more modern architecture, better integration capabilities, and simplification of its deployment process. Google Chronicle Suite requires an enhanced user experience, improved real-time analytics, and a more responsive support system.
Ease of Deployment and Customer Service: Deployment of ArcSight ESM is considered more complex and time-consuming, but it offers more responsive and effective customer service. Google Chronicle Suite has a simpler and faster setup process, though its support is satisfactory.
Pricing and ROI: ArcSight ESM involves high setup costs but offers a good return on investment due to effective threat detection. Google Chronicle Suite is more cost-effective with quicker ROI, attributed to its efficient processing and scalability.
ArcSight Enterprise Security Manager (ESM) is a powerful SIEM solution for analyzing, collecting, correlating, and reporting on security event information. ArcSight ESM analyzes information from all of your data sources while helping your organization maintain high security. In addition, the solution is very customizable and enables users to create their own company-specific rule sets to automatically trigger instant alerts.
ArcSight Enterprise Security Manager (ESM) Features
ArcSight Enterprise Security Manager (ESM) Benefits
Some of the benefits of using ESM include:
Reviews from Real Users
Below are some reviews and helpful feedback written by ArcSight Enterprise Security Manager (ESM) users.
A Head of Professional Services at a computer software company says, “The simplicity of the solution is the most valuable aspect of the product. The product is quite mature. It's been around for a long time. The integration is easy for the most part.”
A Managing partner at a tech services company states that the solution is “Good at consolidating logs, fairly stable, and can scale.”
PeerSpot user Abbasi P., Vice President Derivatives Ops IT at a financial services firm, explains, “The user interfaces are quite good and speedy, and I like the consoles too. The typology and the setup are also good.”
A Chief Technological Officer at a tech services company says, "It is a very useful tool for intelligence building because it has many use cases and many rule sets."
An Associate Vice President at a consumer goods company comments, “We primarily use the solution for its technology including its independent logs, and those types of things. The solution offers very good monitoring. The product's log management and event management capabilities are excellent. There are a lot of really good analytical components. It helps us focus on analysis.”
Organizations primarily leverage Google Chronicle Suite for centralized log management, threat intelligence, and endpoint security, addressing MDR requirements with continuous monitoring.
Google Chronicle Suite supports storage, security, and alert checking. Utilizing log information to generate alerts and integration with search engines, it monitors network and login issues. It is a choice for consultants on client projects, and partners handle its global resale and implementation.
What are the key features of Google Chronicle Suite?Industries employ Google Chronicle Suite for its robust security measures and log management. It is especially vital for IT, finance, healthcare, and any sector needing stringent security and compliance. Consultants find it essential for tailoring security protocols in client projects, while partners ensure seamless implementation across regions.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.