

Devo and Microsoft Sentinel are competing products in the cybersecurity space. While user reviews favor Devo for pricing and support, Microsoft Sentinel is preferred for its comprehensive features.
Features: Devo is known for robust log management, advanced search capabilities, and strong data ingestion. Microsoft Sentinel offers extensive integrations, AI-driven threat detection, and detailed incident response.
Room for Improvement: Devo could benefit from enhanced alerting mechanisms, better scalability, and a more intuitive user interface. Microsoft Sentinel needs more intuitive configuration settings, reduced false positives, and improved documentation.
Ease of Deployment and Customer Service: Devo is noted for a smooth deployment process and responsive customer service. Microsoft Sentinel, while praised for customer service, requires a more complex deployment. Users find Devo easier to deploy but equally value Microsoft Sentinel's support.
Pricing and ROI: Devo's setup cost is considered reasonable, with users reporting a high ROI due to efficient log management. Despite its higher cost, Microsoft Sentinel is seen as offering better value through advanced threat detection capabilities, justifying its expense with comprehensive features.
If a customer is already using Microsoft’s ecosystem, the ROI can be positive due to seamless integration.
Our MTTR, mean time to response, improved by forty to fifty percent. Earlier, medium-severity incidents took two to three hours to resolve. Now, after Microsoft Sentinel, it is forty to fifty-five minutes.
For example, time saving on incidents is 40 to 50%, and previously, incident analysis took two to three hours, whereas now it takes 30 to 60 minutes.
Microsoft invests significantly in support, which is crucial for companies.
I believe Microsoft could improve by keeping customer service within the US for Microsoft Sentinel customers who are within state and federal government sectors.
Working with a Sentinel engineer helped us tune settings effectively.
There is no need to add hardware or redesign infrastructure because it is cloud-native.
As our organization uses Microsoft Azure and Defender, everything grows together, and we can integrate various features seamlessly.
Being a SaaS solution, the scalability of Microsoft Sentinel is robust.
I have never experienced any downtime, crashes, or performance issues with Microsoft Sentinel because it is SOC as a Service, so it maintains 100% uptime and scaling.
In the past two years, our team hasn't encountered any issues with the stability of Microsoft Sentinel from an operations perspective.
I need to be aware of deprecated connectors as they may disconnect, but the data continues to be sent with a need for quick adaptation.
This is particularly evident when dealing with failed login attempts and determining true versus false positives.
Log ingestion and retention costs can grow quickly, and understanding which data source is driving cost is not always straightforward.
We have some tools, such as our off-site Meraki firewalls, that have not fully integrated with Sentinel.
There are complexities in calculating the right pricing tier for different customers, which makes it difficult for me as a consultant during upfront pricing.
It has been beneficial that Microsoft Sentinel is included as part of the Microsoft package, making it more cost-effective.
Microsoft Sentinel is not a low-cost SIEM.
Microsoft Sentinel is provided at no cost, so we didn't have any issues with the cost.
When they see a spike in a line chart for a failed login, which could be a true or false attempt, they can click that spike, and a table widget on the same active board instantly populates with raw logs of data for those specific failed logins.
Microsoft Sentinel's ability to correlate data from multiple sources and its detection capabilities are essential.
Microsoft Sentinel has improved cost efficiency, which is one of the key areas we're able to win business against the ability to have threat intelligence.
Microsoft Sentinel's ability to correlate data from multiple sources enhances our threat detection capabilities beyond what is a simple data lake solution by filtering out the noise and consolidating the signal down to a meaningful level that is easier to investigate and see.
| Product | Mindshare (%) |
|---|---|
| Microsoft Sentinel | 4.0% |
| Devo | 1.2% |
| Other | 94.8% |

| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 4 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 23 |
| Large Enterprise | 46 |
Devo offers powerful visual analytics, real-time data querying, and log integration capabilities within a cloud-native, multi-tenant architecture, supporting extended data retention ideal for long-term analysis and compliance.
Devo is recognized for its Activeboards, which facilitate visual analytics. High-speed search capabilities and real-time analytics enable efficient data manipulation and querying. Its multi-tenant architecture supports effective data segregation and customization tailored to distinct business needs, enhancing its value for handling complex log integrations. With extended data retention of 400 days and a cloud-native architecture, Devo is a robust platform for long-term analysis and compliance requirements. Though opportunities exist to improve browser stability on large searches, SOAR integrations, and its parser capabilities, Devo remains essential for incident response and security monitoring, offering centralized data storage and analysis.
What are Devo's most important features?Devo is extensively used in industries focused on incident response and digital forensics, centralizing data for security monitoring across hybrid environments. Organizations benefit from its ability to store and analyze aggregated logs, creating alerts and dashboards to enhance visibility for network and endpoint activities in multi-domain settings.
Microsoft Sentinel offers cloud-native SIEM and SOAR capabilities with AI-powered threat detection, automated responses, and integration with Microsoft products. It is designed for comprehensive threat management with flexible deployment and scalability.
Microsoft Sentinel provides centralized management of cloud-based security monitoring and incident detection. Leveraging AI capabilities, it enhances threat intelligence and automation, allowing users to streamline security operations across cloud and on-premises systems. Microsoft Sentinel efficiently aggregates logs, correlates security events from multiple sources, and integrates seamlessly with Microsoft security offerings such as Defender. While its flexible deployment options and robust automation through playbooks are advantageous, users may encounter challenges with integration outside of Microsoft products, potential log ingestion delays, and a complex query language. The platform would benefit from enhanced speed, a simplified interface, improved query performance, and stronger documentation support.
What are the most important features of Microsoft Sentinel?In specific industries, Microsoft Sentinel is utilized for its capability to monitor cloud-based workloads and detect incidents effectively. Users in healthcare, finance, and retail adopt it for its strong AI-driven threat detection and its ability to integrate with existing Microsoft solutions, ensuring high-level security operations and compliance with industry standards.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.