

ArcSight Logger and Elastic Security are both formidable in the security information and event management category. Elastic Security seems to have the upper hand due to its scalability, threat detection capabilities, and advanced threat hunting as highlighted by user reviews.
Features: ArcSight Logger users benefit from comprehensive event log management, efficient data auditing, and detailed log analysis. Elastic Security is valued for its scalable threat detection features, superior visualization tools, and ease of integration with other data sources.
Room for Improvement: ArcSight Logger faces integration complexities, a steep learning curve, and user challenges in mastering technical aspects. Elastic Security requires better documentation, seeks more seamless support options, and clearer configuration clarity as highlighted by users.
Ease of Deployment and Customer Service: ArcSight Logger has a straightforward deployment requiring technical expertise and is recognized for responsive customer service. Elastic Security offers flexible deployment models but involves complex configurations and has a need for improved support channels.
Pricing and ROI: ArcSight Logger involves a high initial setup cost but offers fair ROI with its log management capabilities. Elastic Security, while also necessitating a significant upfront investment, is perceived to deliver better ROI due to integrated security features and adaptability to dynamic threats.
It does not require hefty security budgets and can be deployed for enterprise security effectively.
We provide pre-implementation, implementation, and post-implementation support.
Most of the time when my team encounters issues, they receive responses within 24 hours.
Providing necessary assistance efficiently.
I have not faced any difficulties with Elastic Security, as we have a pretty good support service from them.
Elastic Security is quite scalable.
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
In terms of stability, I would rate Elastic a solid eight out of ten.
Splunk does much more than SIEM, including log analysis, user behavior analysis, threat intelligence, and customer behavior analysis.
Machine learning algorithms become better with time; as they ingest a huge volume of data, they become better.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
Elastic Security is considered cost-effective, especially at lower EPS levels.
ArcSight Logger installs on very minimal resources with very few requirements
Elastic Security offers good insight regarding alerts, reports, and cases.
Elastic Security offers advanced features such as machine learning and integration with ChatGPT.
We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data.
| Product | Mindshare (%) |
|---|---|
| Elastic Security | 3.2% |
| ArcSight Logger | 0.9% |
| Other | 95.9% |

| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 10 |
| Large Enterprise | 16 |
| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 11 |
| Large Enterprise | 15 |
ArcSight Logger effectively manages vast log data volumes, streamlining complex query execution and data compression while supporting various devices to meet compliance needs.
ArcSight Logger, known for scalability, simplifies handling extensive log data and executes complex queries swiftly. Its data compression features, coupled with versatile device support, allow for smooth security analytics and log collection. Users appreciate its real-time network insights and intuitive interface. However, improvements are needed in indexing speed, user navigation simplification, enhanced system integration, advanced analytics, and comprehensive threat management. Companies leverage ArcSight Logger for on-premises log management, vital for IT asset event monitoring and compliance within telecom and enterprise sectors.
What are the key features?In industries like telecom and enterprise, ArcSight Logger facilitates on-premises deployments to manage logs, process queries, and integrate with security tools, essential for incident response. It aids in retaining logs, monitoring Windows events, overseeing communications, and is employed in fraud prevention and security monitoring involving syslog servers.
Elastic Security stands out for its speed, scalability, and intuitive interface. It integrates seamlessly with Elasticsearch and Kibana, providing efficient data indexing, centralized log management, and intelligent threat identification, all while being open-source.
Elastic Security offers robust capabilities in security monitoring, threat identification, and SIEM functionalities. Its open-source nature enhances scalability, facilitating log aggregation and infrastructure monitoring. Users appreciate the intuitive dashboards and machine learning integration, which aid in proactive security measures and anomaly detection. Despite its strengths, improvements are needed in documentation, scalability, and configuration complexity. High data volume pricing and limited machine learning support are concerns, while dashboard enhancement and seamless integration with existing systems are desirable. The platform is widely used for alerting suspicious activities, analyzing logs from firewalls and Active Directory, and providing endpoint protection. It serves as a key tool for security awareness and auditing, integrating effectively with technologies like Kibana and OpenShift.
What are the most notable features of Elastic Security?Organizations deploy Elastic Security across industries for log aggregation and security monitoring, detecting unauthorized access, and analyzing system logs. It is essential for infrastructure monitoring and integrates effectively with systems such as Fluentd and OpenShift, supporting comprehensive security views across enterprise environments.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.