The CMDB and the device discovery features are most valuable.
Chief Technical Officer at a computer software company with 51-200 employees
Beneficial CMDB and device discovery, but implementation process needs improvement
Pros and Cons
- "The CMDB and the device discovery features are most valuable."
- "I would like to see easier implementation in the future."
What is most valuable?
What needs improvement?
I would like to see easier implementation in the future.
For how long have I used the solution?
I have been using the solution for approximately five months.
What do I think about the scalability of the solution?
Most of our clients are medium-sized businesses.
Buyer's Guide
Fortinet FortiSIEM
January 2025
Learn what your peers think about Fortinet FortiSIEM. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,158 professionals have used our research since 2012.
How are customer service and support?
The technical support has been very good in helping us with issues we have been facing during the implementation of the solution. We are not finished yet but we are close.
How was the initial setup?
The initial setup is not simple.
We are having some issues with the agent installation, it is requiring several reboots. This could be the system environment at the client site because in our lab the agent installation is straightforward and it does not require reboots. We are still working on this issue.
What about the implementation team?
We are doing the implantation of the solution and it has a moderate level of difficulty.
What other advice do I have?
I rate Fortinet FortiSIEM a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
Senior Technical Consultant at a integrator with 201-500 employees
Configuration in initial setup is complex. Product's analytics provide log info letting you see threats.
Pros and Cons
- "Analytics. It can provide log information from the device. With log information, I can see if there is a threat"
- "If there is a configuration on the wrong side of the network or there are changes that result in harm to our IT infrastructure, the solution should immediately fix it."
How has it helped my organization?
From CMDB configuration monitoring, it can provide information changes.
What is most valuable?
Analytics. It can provide log information from the device. With log information, I can see if there is a threat
What needs improvement?
In the CMDB configuration monitoring. Example, if there is a configuration on the wrong side of the network or there are changes that result in harm to our IT infrastructure, the solution should immediately fix it.
What do I think about the stability of the solution?
Yes.
What do I think about the scalability of the solution?
Yes.
How are customer service and technical support?
Very good.
Which solution did I use previously and why did I switch?
FortiSIEM is better than previous products.
How was the initial setup?
Complex due to the configuration.
What's my experience with pricing, setup cost, and licensing?
Please be cheaper and more simplified.
Which other solutions did I evaluate?
Yes, but I cannot mention it because of privacy issues.
What other advice do I have?
Please do a PoC.
Disclosure: My company has a business relationship with this vendor other than being a customer: I'm Partner.
Buyer's Guide
Fortinet FortiSIEM
January 2025
Learn what your peers think about Fortinet FortiSIEM. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,158 professionals have used our research since 2012.
Network and Security Administrator at PETRA Engineering Industries Co.
Hybrid Fortinet Fabric Solutions with a comprehensive view for all Fortinet products and a little support for other vendors
Pros and Cons
- "The interface is very easy to use. The connector in the core has FortiSIEM support from the vendor."
- "The nodes on our network did not comply with the SIEM solution. They use a different format parking log."
What is our primary use case?
We're using FortiSIEM as the main metadata server for all the security and infrastructure devices. We integrate a lot of nodes, switches, firewalls, and sandboxes with it to gain and covers performance, availability, change, and security monitoring aspects of network devices, servers, and applications.
How has it helped my organization?
FortiSIEM gives us a lot of valuable events and details by using a unified event-based framework to analyze all data including logs, performance monitoring data and provides a broad range of metrics.
What is most valuable?
The comprehensive view of the dashboard and the attribute base interface and the flexibility of implementation methods.
What needs improvement?
The Fortinet Fabric should be more easy more friendly to use. They use a different parsing log format.
for example Symantec ATP is not supported by FortiSIEM. Our reseller provided us FortiSIEM as a service. They should also provide us with a dashboard to monitor and to deploy a correlations.
I think fortinet should improve the AI correlations by combining advanced statistical and heuristic analysis with behavioral whitelisting .
For how long have I used the solution?
I have been using the solution around six months.
What do I think about the stability of the solution?
Stability is the main feature we had looked for because of our environment, i.e. why we chose FortiSIEM. The stability is good. We just install a connector on the supervisor outside.
With the stability of the connector, we faced some problems. The reseller asked us to reinstall the connector. The problem was with the reseller, not the connector.
How are customer service and technical support?
We used the solution's technical support for a lot of cases and tickets. Their responses are very good, kind, and quick.
Which solution did I use previously and why did I switch?
They have a poor correlation. They didn't use any new concepts like Fortinet. They just display the logs as it is with no attribute base.
How was the initial setup?
The initial setup with Fortinet FortiSIEM Accelops was not easy. We had faced a few problems. but I think Fortinet should give more training courses for their resellers.
We needed to find what the weak points were. in our network. Our deployment took up to two months.
We were looking to deploy a unique correlation between nodes. We wanted to track the packets from our clouds Services like cloud sandbox and anti-spam to log our end-to-end connections.
The reseller told us that they comply with our solution. After that, we figured out that it was not going to very easy. FortiSIEM doesn't support ATP Symantec.
They also did not support our web gateway log format.
What other advice do I have?
The interface is easy to use but initial setup is not . The connector in the core has FortiSIEM support from the vendor. FortiSIEM supports a lot of vendors. It is a good product for us.
I rank it as eight on a scale from one to ten. because It doesn't support a lot of vendors and also the FortiSIEM still not common to use with fortinet partner maybe they doesn't give adequate training.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical Lead at Arcon Labs at a tech services company with 51-200 employees
It's complicated to deploy but detection rules are flexible
Pros and Cons
- "AccelOps can handle a lot of data and it's just so important to true monitoring. Also, I can create a lot of rules to detect anything I like."
- "Does not have load-sharing or high-availability, and these are important things to implement. I can do the same things in another way, but not naturally having these features makes it complicated."
What is our primary use case?
My primary use case is that it is an analyst tool for hunting on your site network.
How has it helped my organization?
The platform is nice. It is not easy to implement, but once you do so, there is a lot of value from the platform.
What is most valuable?
AccelOps can handle a lot of data and it's just so important to true monitoring. That is the strong point of AccelOps.
The second one is detecting. I can create a lot of rules to detect anything I like, and this is another strong point.
It's also the only SIEM platform on the market that has health monitoring capabilities, and correlates. For example, if a service is going down I can detect that it is going down and correlate it. For example, if it's because of an exploit can correlate this. It's a nice feature.
What do I think about the stability of the solution?
I think all SIEM platforms have a problem handling a lot of data. My response is "it depends." Depends on the people, depends on the product, depends on the technology. To implement any technology you need good people, and this is independent of the label of the company or technology. The stability is not bad, it's not good. It's a complicated question.
What do I think about the scalability of the solution?
I don't have any feature for load-sharing or high-availability, and these are important things to implement. I can do the same things in another way, but not naturally having these features makes it complicated. For example, the design is bad because you have one supervisor on one machine and you handle everything off this machine supervisor. It is a design problem. The technology also has limitations because you have a lot of memory and a lot of processors, but you have a limit with processors and memory, which causes problems with scalability.
How are customer service and technical support?
It's equal to any technical support. You need to go to level one, level two, level three to reach their engineers. It is complicated. With any technology it is like this. But my level of skill here is high, and going to level one, level two, level three is complicated. You have a ladder to solve the problems quickly. That's the problem. Any platform, any vendor has the same problem. You need to go through levels until you find one guy who can solve your problem.
Which solution did I use previously and why did I switch?
I used a solution previously. I switched because I needed evolving technology. I needed to evolve to smart features.
The most important criteria when selecting a vendor is price. After that it's detection.
How was the initial setup?
For the first steps you have some help. At the beginning you have priority support, you have engineers. After that you pay.
It's complex because you need to evaluate a lot of things.
What other advice do I have?
I advise that you should plan your financial resources and plan the platform. Also, be sure to test the performance ability, as well as scalability.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer L1 at a media company with 11-50 employees
Easy to understand and the technical support is good, but they need better documentation
Pros and Cons
- "It's a very nice solution to work with."
- "There is no proper guide for integration or configuration."
What is our primary use case?
We are trying to onboard some devices, which we will analyze using Fortinet FortiSIEM.
Once it responds smoothly, we will onboard some clients with requests.
What is most valuable?
It's a very nice solution to work with. It is easy to understand.
What needs improvement?
There is no proper guide for integration or configuration. They need to improve the documentation library.
For how long have I used the solution?
We are using the enterprise version in my organization. I have been using it for 30 to 40 days, but not more than two months.
How are customer service and technical support?
We have contacted technical support. They are good and provide good resolutions.
How was the initial setup?
The initial setup was straightforward.
What other advice do I have?
I will definitely recommend this solution to others. I am still exploring it, as it is new to us. I need more time to analyze it further.
I would rate Fortinet FortSIEM a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Security and Compliance Officer at a energy/utilities company with 501-1,000 employees
It gives us a greater visibility into potential data/network breach attempts with the monitoring and alerting capabilities.
What is most valuable?
- Log correlation
- Alerting
How has it helped my organization?
AccelOps gives us a greater visibility into potential data/network breach attempts with the monitoring and alerting capabilities.
What needs improvement?
Ease-of-use for end users that do not spend every day in the product.
Also, the presentation of historical and trending data in dashboards needs to be improved immensely. Something as simple as an RRDtool graphing mechanism on a dashboard would be a huge improvement to the product.
For how long have I used the solution?
I've used it for one and half years.
What was my experience with deployment of the solution?
Not that I recall, but its been over a year since deployment.
What do I think about the stability of the solution?
No issues encountered.
What do I think about the scalability of the solution?
No issues encountered.
How are customer service and technical support?
Customer Service:
It's high.
Technical Support:Medium to high, some of the problems is just in the maturity of the product and how AccelOps develops this moving forward.
Which solution did I use previously and why did I switch?
Solarwinds, we assumed that AccelOps would be an easier product to manage moving forward and it was less expensive.
How was the initial setup?
I don't think it was complex.
What about the implementation team?
In-house with a little assistance from support.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Team Leader at a tech services company with 11-50 employees
Our customers have seen improvement in their connection with load balancing on both connections
Pros and Cons
- "Some of our customers who use this solution have seen improvement in their connection with load balancing on both connections."
- "Our customers are noticing configuration available in the GUI interface and I think that they should be equal."
What is our primary use case?
We are a system integrator and we resell this solution.
How has it helped my organization?
Some of our customers who use this solution have seen improvement in their connection with load balancing on both connections.
What needs improvement?
Our customers are noticing configuration available in the GUI interface and I think that they should be equal.
What do I think about the stability of the solution?
Stability and scalability are perfect.
How was the initial setup?
The initial setup wasn't complex. It took three days to deploy and we required two people for the deployment.
What other advice do I have?
I would rate it a nine out of ten. The configuration should be equal with the GUI interface.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
ICT Architect at a insurance company with 51-200 employees
CMDB database collects data from a lot of pre-configured devices
Pros and Cons
- "The most valuable feature is the dashboard. CMDB database collects data from a lot of pre-configured devices."
- "The performance can be improved. Sometimes it takes a long time to fetch data."
What is our primary use case?
We use the on-prem model of this solution. Our primary use case is for malware and behavior monitoring. We also use it to monitor system performance and user behavior.
What is most valuable?
The most valuable feature is the dashboard. CMDB database collects data from a lot of pre-configured devices.
What needs improvement?
The performance can be improved. Sometimes it takes a long time to fetch data.
For how long have I used the solution?
I have been using this solution for one and a half years.
What do I think about the stability of the solution?
It is very stable.
What do I think about the scalability of the solution?
Scalability is very good. We currently have 150 users using this solution. We don't have plans to increase usage at the moment.
What about the implementation team?
We implemented through Fortinet professional services. We were one of the first customers to implement the new version and it was a bit complex. I believe it has become easier. Deployment took them only a few hours. It didn't take a long time.
What other advice do I have?
I would rate it an eight out of ten. They should implement better behavior monitoring features to make it a perfect ten. It should also have better integration with their own products. They have a lot of interfaces for other products but it's not so easy to integrate their own devices.
I would recommend this solution to someone considering it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Fortinet FortiSIEM Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Product Categories
Security Information and Event Management (SIEM)Popular Comparisons
Splunk Enterprise Security
Microsoft Sentinel
IBM Security QRadar
Elastic Security
LogRhythm SIEM
Sumo Logic Security
Rapid7 InsightIDR
AlienVault OSSIM
Securonix Next-Gen SIEM
USM Anywhere
ManageEngine Log360
Google Chronicle Suite
Buyer's Guide
Download our free Fortinet FortiSIEM Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Solution for SIEM is Best To Be NIST 800-171 Compliant?
- When evaluating Security Information and Event Management (SIEM), what aspect do you think is the most important feature to look for?
- What are the main differences between Nessus and Arcsight?
- What's The Best Way to Trial SIEM Solutions?
- Which is the best SIEM solution for a government organization?
- What is the difference between IT event correlation and aggregation?
- What Is SIEM Used For?
- RSA-EMC vs. other SIEM products?
- What Questions Should I Ask Before Buying SIEM?
- What are the pros and cons of internal SOC vs SOC-as-a-Service?