ArcSight Enterprise Security Manager ESM and Graylog Security are both prominent solutions in the security information and event management SIEM space. Users are generally more satisfied with Graylog Security due to its features and performance.
Features:ArcSight ESM is known for comprehensive data analysis, robust event correlation capabilities, and thorough analytics. Graylog Security is praised for powerful search capabilities, user-friendly setup, and flexible integration options.
Room for Improvement:ArcSight ESM requires enhancements in its reporting structure, the complexity of its configuration process, and a more intuitive interface. Graylog Security users suggest improvements in its alerting system, more advanced reporting features, and additional user training materials.
Ease of Deployment and Customer Service:ArcSight ESM’s deployment is complex and time-consuming, though customer service is supportive. Graylog Security offers straightforward deployment, significantly reducing setup times, with responsive customer service.
Pricing and ROI:ArcSight ESM has higher setup costs that some users find difficult to justify given the operational complexity. Graylog Security is noted for its budget-friendly pricing and quicker return on investment, providing better value for money.
ArcSight Enterprise Security Manager (ESM) is a powerful SIEM solution for analyzing, collecting, correlating, and reporting on security event information. ArcSight ESM analyzes information from all of your data sources while helping your organization maintain high security. In addition, the solution is very customizable and enables users to create their own company-specific rule sets to automatically trigger instant alerts.
ArcSight Enterprise Security Manager (ESM) Features
ArcSight Enterprise Security Manager (ESM) Benefits
Some of the benefits of using ESM include:
Reviews from Real Users
Below are some reviews and helpful feedback written by ArcSight Enterprise Security Manager (ESM) users.
A Head of Professional Services at a computer software company says, “The simplicity of the solution is the most valuable aspect of the product. The product is quite mature. It's been around for a long time. The integration is easy for the most part.”
A Managing partner at a tech services company states that the solution is “Good at consolidating logs, fairly stable, and can scale.”
PeerSpot user Abbasi P., Vice President Derivatives Ops IT at a financial services firm, explains, “The user interfaces are quite good and speedy, and I like the consoles too. The typology and the setup are also good.”
A Chief Technological Officer at a tech services company says, "It is a very useful tool for intelligence building because it has many use cases and many rule sets."
An Associate Vice President at a consumer goods company comments, “We primarily use the solution for its technology including its independent logs, and those types of things. The solution offers very good monitoring. The product's log management and event management capabilities are excellent. There are a lot of really good analytical components. It helps us focus on analysis.”
Graylog Security is designed for log management and analysis, assisting in monitoring security events, detecting threats, providing real-time alerts, and aiding troubleshooting and forensic investigations. Its scalability and customizable dashboards support IT departments in maintaining system performance and ensuring compliance.
With exceptional log management capabilities and powerful search functions, Graylog Security is reliable for threat hunting, integrating with other tools, and offering a user-friendly dashboard. Organizations value it for quickly analyzing large datasets and providing detailed insights into security events. However, better documentation and clearer instructions for new users, more efficient alerting capabilities, easier scaling, and enhanced support options could improve user satisfaction.
What are the most important features of Graylog Security?Graylog Security is implemented across diverse industries, including healthcare for patient data protection, finance for transaction monitoring and fraud detection, and retail for safeguarding customer information. Each industry leverages its detailed analytics and real-time alerting to meet specific regulatory and operational standards, ensuring a secure and compliant environment.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.