Try our new research platform with insights from 80,000+ expert users

Adlumin Security Operations vs Elastic Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 15, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Extended Detection and Response (XDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
108
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Adlumin Security Operations
Ranking in Extended Detection and Response (XDR)
40th
Average Rating
0.0
Reviews Sentiment
3.3
Number of Reviews
1
Ranking in other categories
Security Information and Event Management (SIEM) (53rd), User Entity Behavior Analytics (UEBA) (25th), Managed Detection and Response (MDR) (22nd), Risk-Based Vulnerability Management (24th)
Elastic Security
Ranking in Extended Detection and Response (XDR)
8th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
66
Ranking in other categories
Log Management (9th), Security Information and Event Management (SIEM) (5th), Endpoint Detection and Response (EDR) (15th), Security Orchestration Automation and Response (SOAR) (7th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
NickShmakov - PeerSpot reviewer
Md at Res-Q
Strong security reporting has supported our consulting work and drives better integration choices
I rated Adlumin Security Operations probably the same as Huntress at eight. They are better at reporting and better integrations. The integrations in terms of the number of integrations you can run from them or connect to are not as many as available with Huntress, but they have easier implementation. Overall, I would say it is the same. I do not want to see any additional features in the next release of Adlumin Security Operations, but I would change the pricing a little bit for around SIEM integrations and SIEM data collection. That is probably the maximum I would do. I do not really have much to say because that is literally five percent of our deployments versus ninety-five percent being Huntress. My overall rating for this review is eight.
Laurentiu Popescu - PeerSpot reviewer
Chief Product Officer at ClusterPower
Has improved threat detection with deep log analysis and streamlined investigation workflows
The most useful features I find in Elastic Security are the forensic ones that allow us to carry deeper analysis into the logs for in-depth investigations, and the dashboards, with the reporting dashboard being quite user-friendly. Elastic Security is quite good at identifying threats, as it is part of the deep investigation tool that I mentioned before. Unless we need to look further into a certain log, we can carry out a deeper analysis and forensics on those particular logs. I can assess the impact of Elastic Security's real-time data analysis on our threat response efficiency as working pretty good. We are looking for real-time analysis because we have a continuous inflow of logs from different sources: from our cloud, from Active Directory, from our network. So it works pretty well.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cortex is the best tool for endpoint detection, and I have used it to verify hashes or domains to identify malicious activity, trigger playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"I've found the solution to be highly scalable for enterprises."
"It's very stable. I've never experienced downtime for the ASM console or ASM core."
"The ability to kind of stitch everything together and see the actual complete picture is very useful. I guess you'd call it a playbook. Some people call it the forensics analysis of what was happening on particular endpoints when they detected some malicious behavior, and what transpired before that to cause that. It is also very user friendly. The way they have done everything and integrated all the solutions that they've purchased over the years to make it a very seamless, effective product is very good. One thing about Palo Alto is that they take the products or services that they purchase and make them seamless for the end user as compared to some companies that purchase other companies and then just kind of have their products off to the side or keep different interfaces. Palo Alto doesn't do that."
"We can visualize and control the activities in the environment from anywhere."
"What I like about Cortex XDR by Palo Alto Networks is that it is a comprehensive solution that contains everything the organization may need when using endpoints."
"Cortex is the best tool for endpoint detection, with playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"If any application performs suspicious activities, such as changing registries or modifying other applications, Cortex XDR detects and blocks the entire application."
"We normally focus on Huntress."
"It's simple and easy to use."
"Elastic Security helps improve the security posture of Pakistan through centralized visibility and real-time processing."
"Elastic Security actually has a very good cost-benefit ratio compared to other vendors in the market."
"The most valuable feature is the scalability. We are in Indonesia, more engineers understand Elastic Security here. So it is easier to scale and also develop. In features, the discovery to query all the logs is very important to us. It is very easy, especially with the query function and the feature to generate alerts and create tools. Sometimes we use the alert security dashboard to monitor our clients."
"Elastic Security is very easy to adapt."
"It's a good platform and the very best in the current market. We looked at the Forester report from December 2022 where it was said to be a leader."
"The product has huge integration varieties available."
"The most valuable feature for me is Discover."
 

Cons

"The solution lacks real-time, on-demand antivirus."
"It's very time-consuming to log support issues and the people that answer the tickets aren't very knowledgeable."
"The solution lags to the real-time scenarios here and there."
"Enhancing UI simplicity and playbook flexibility are areas that could benefit from more low-code automation options for smoother integrations."
"Impact on system performance is horrible, adding a lot of delays for users."
"The setup is quite easy. We had appropriate support from the manager. One thing that was missing was the integration part."
"The downsides of Cortex XDR by Palo Alto Networks are that in many incidents, when I enter the causality chain, there are numerous logs."
"The tool needs to be improved in terms of integration and interface."
"Adlumin Security Operations's functionality is probably slightly better, but implementation and integration with Office 365 was not as straightforward."
"The interface could be more user friendly because it is sometimes hard to deal with."
"I do not have any specific recommendations for improvements in Elastic Security, but I feel that the AI module should get more mature."
"Their visuals and graphs need to be better."
"Elastic Security can be a bit difficult to use if a person only has experience in SMBs with tools like Zoho. The product can also be difficult for those who have never dealt with query language."
"The solution does not have a UI and this is one of the reasons we are looking for another solution."
"It could use maybe a little more on the Linux side."
"The solution could also use better dashboards. They need to be more graphical, more matrix-like."
"This type of monitoring is not very mature just yet. We need more real-time information in a way that's easier to manage."
 

Pricing and Cost Advice

"I feel it is fairly priced."
"The price of the product is not very economical."
"If one wishes to work with another team or large number of users at a future point, he must purchase a license for them."
"The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic."
"It's the most expensive solution, but features-wise, it's quite strong. It's very good for protection, so the results are very good in the case of protection. I would rate it a two out of ten in terms of pricing."
"It has reasonable pricing for the use cases it provides to the company."
"The pricing is a little high. It is per user per year."
"It's about $55 per license on a yearly basis."
Information not available
"The base product is open-source but if you need advanced security features then you need to pay for the subscription. Elastic Security's price is reasonable in some cases and in other cases it's not."
"Affordable but with additional costs"
"The price is reasonable. It probably costs the same as ArcSight and LogRhythm SIEM. FortiSIEM might cost less than Elastic Security. There are no hidden or additional costs."
"It's a monthly cost with Elastic SIEM, but I am not sure of the exact cost."
"There is no charge for using the open-source version."
"We are using the free, open-source version of this solution."
"Its price is fine. Its licensing works on a yearly basis. We have to renew the license every year. I also have a good experience with Darktrace. When we buy Darktrace, we get training free of cost, which is not there in Elastic. We have to pay extra for training. There is certainly room for improvement."
"I find it better than Splunk in terms of cost-effectiveness. For cost-effectiveness, I would rate it a nine out of 10."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
9%
Manufacturing Company
9%
Financial Services Firm
9%
Comms Service Provider
7%
Computer Software Company
14%
Comms Service Provider
9%
Retailer
7%
Real Estate/Law Firm
7%
Computer Software Company
10%
Government
9%
Comms Service Provider
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
No data available
By reviewers
Company SizeCount
Small Business40
Midsize Enterprise11
Large Enterprise15
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What needs improvement with Adlumin Security Operations?
I see room for improvement. I would want to improve reporting.
What is your primary use case for Adlumin Security Operations?
I have hands-on experience with Huntress as a consultant and a reseller. I deal with some competitors as well, but I ...
What advice do you have for others considering Adlumin Security Operations?
I rated Adlumin Security Operations probably the same as Huntress at eight. They are better at reporting and better i...
Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several time...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it con...
What is your experience regarding pricing and costs for Elastic Security?
I am satisfied with the pricing, setup cost, and licensing cost. It is a pure 10.
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Adlumin Cybersecurity Platform
Elastic SIEM, ELK Logstash
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Courthouse News Service, Maschoff Brennan, Sky Lakes Medical Center, Tooele County School District, Southern Oregon ESD, CNB Bank & Trust, Ogden City, Southeast Financial Credit Union (SEFCU), Utah State Bar, Financial Plus Credit Union, Kelly Community, United Southern Bank of Kentucky (USBKY)
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Find out what your peers are saying about Splunk, Wazuh, IBM and others in Security Information and Event Management (SIEM). Updated: March 2026.
884,873 professionals have used our research since 2012.