What is our primary use case?
Our company includes 20 senior engineers and analysts who use the solution to detect viruses on Windows servers and critical assets.
We also track user activity such as connections during travel.
We have many use cases and playbooks in our portfolio.
How has it helped my organization?
Our company uses the solution as our main CM to detect malicious activity. There are many campaigns targeting Europe and other countries so it is important that we remain vigilant about suspicious activity inside our organization.
The solution uses rules to identify suspicious activity that needs to be investigated. We conduct advanced forensic investigations based on the solution's output, including collecting logs from devices and correlating them for processing by a security analyst.
What is most valuable?
Blocks of predefined conditions can be used to configure detection rules without having to write complicated script.
Real-time detection is quite efficient and valuable. Other products such as Splunk focus only on running searches to detect a particular behavior.
The Vulnerability Manager module is useful and quite efficient.
What needs improvement?
The dashboard and reports are not user-friendly or efficient so are of little help with threat hunting activity. We deal with large data sets so need to have great visibility for detection of malicious activity and indicators for cybersecurity.
For example, the dashboards for Power BI and Splunk are very efficient and it is easy to observe suspicious activity.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
The solution is stable and easy to use if deployed well.
On occasion, you might get an error when running advanced analytics but reboots are not needed.
What do I think about the scalability of the solution?
The solution is scalable and it is easy to add appliances or expand your license.
How are customer service and support?
Engineers used technical support regularly between 2016 and 2019 and found them to be very helpful and responsive. If a situation was urgent, technical support intervened immediately.
I rate technical support an eight out of ten.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I used the solution, switched to Splunk, then switched back to the solution.
How was the initial setup?
The ease of setup is based on the complexity of your environment and network architecture.
The initial setup is not complicated and should go smoothly if you set all predefined requirements prior to installing the solution.
It took us two weeks to prepare all requirements and a few hours to deploy which included installing all resources.
Documentation for the installation process is pretty straightforward.
What about the implementation team?
An in-house team that handles integrations was responsible for implementing the solution. Myself and other cybersecurity analysts participated with the team.
A team of three engineers handle ongoing maintenance for our large environment.
What's my experience with pricing, setup cost, and licensing?
The solution has a licensing model that is based on events per second so it scales to need and budget.
At the time of deployment, we were premium partners with IBM so received advantageous pricing.
The on-premises solution and its license are not impacted by the number of users so it is easy to add staff.
Which other solutions did I evaluate?
In my experience, Splunk is efficient because it is customizable. You can create scripts to detect multiple behaviors based on scheduled jobs.
What other advice do I have?
I rate the solution a seven out of ten because it is difficult to write script for advanced detection cases and the dashboard is insufficient.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: