Try our new research platform with insights from 80,000+ expert users

Elastic Security vs N-able EDR comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Elastic Security
Ranking in Endpoint Detection and Response (EDR)
16th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
64
Ranking in other categories
Log Management (7th), Security Information and Event Management (SIEM) (5th), Security Orchestration Automation and Response (SOAR) (6th), Extended Detection and Response (XDR) (8th)
N-able EDR
Ranking in Endpoint Detection and Response (EDR)
55th
Average Rating
7.0
Reviews Sentiment
8.7
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of Elastic Security is 2.4%, up from 2.2% compared to the previous year. The mindshare of N-able EDR is 0.4%, down from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

Gajewski Marek - PeerSpot reviewer
Provides good anomaly detection and connectivity reporting
We previously used Splunk but switched to Elastic Security because Splunk was more expensive. Feature-wise, both tools are pretty much the same. They have almost the same functions. Elastic Security has a much better AI assistant that allows you to ask questions like a normal person. With Elastic Security, I can also predict the price and how much it will cost. Splunks's pricing depends on how much data we use and the different add-ons I have to add. The pricing is much better with Elastic Security.
Yazan Albaw - PeerSpot reviewer
N-able EDR SentinelOne delivers advanced endpoint protection through real-time threat detection, automated response, and comprehensive visibility to safeguard against cyber threats.
N-able EDR SentinelOne is renowned for its exceptional detection and protection capabilities, ranked number one by Gartner and MITRE ATT&CK. It offers robust defense against various threats, including malware, fileless attacks, phishing, and insider threats. The solution excels in identifying suspicious behavior and promptly notifying engineers of potential threats. A key feature is its auto-response capability. You can configure automatic responses to threats, which significantly reduces the time and effort required to manage incidents. Enhanced by machine learning, these automated responses are both efficient and adaptive. Additionally, N-able EDR integrates seamlessly with RMM (Remote Monitoring and Management), allowing us to monitor EDR performance, detect failures, and oversee network performance from a single, unified dashboard. This integration streamlines management and enhances overall efficiency.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Just the ability to do a lot more than just up-down is nice, which a lot of people take for granted."
"Elastic is straightforward, easy to integrate, and highly customizable."
"Elastic Security helps improve the security posture of Pakistan through centralized visibility and real-time processing."
"The most valuable feature of Elastic Security is that you can install agents, and they are not separately licensed."
"The visualization is very good."
"Elastic Security makes data communication easier."
"Elastic has a lot of beats, such as Winlogbeat and Filebeat. Beats are the agents that have to be installed on the terminals to send the data. When we install beats or Elastic agents on every terminal, they don't overload the terminals. In other SIEM solutions such as Splunk or QRadar, when beats or agents are installed on endpoints, they are very heavy for the terminals. They consume a lot of power of the terminals, whereas Elastic agents hardly consume any power and don't overload the terminals."
"The most valuable feature is the ability to collect authentication information from service providers."
"The most valuable features are the rollback feature, it's important for us. The AI models and are good."
"The most valuable feature, which I can describe as the '360 vision' of the inventory device, provides a complete view of all the devices."
"The most valuable feature, which I can describe as the '360 vision' of the inventory device, provides a complete view of all the devices."
"It provides visibility and a storyline to track the virus or malware's activities, showing infected processes and changes made."
 

Cons

"Elastic Security has a steep learning curve, so it takes some time to tune it and set it up for your environment. There are some costs associated with logging things that don't have value. So you need to be cautious to only log things that make sense and keep them around for as long as you need. You shouldn't hold onto things just because you think you might need them."
"Continuous upgrades can be quite inconvenient. My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently."
"One limitation of Elastic Security is that it does not have built-in workflows for all tasks. For example, if you need a workflow for compliance, you will need to create a custom workflow."
"The solution's query building is not that intuitive compared to other solutions."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"The tool should improve its scalability."
"I want to find an automatic security system in the tool, like a SOAR solution. I am looking forward to seeing a SOAR system in the tool."
"Upgrades currently released as stacks when it should be a plugin or an extension to save removal and reinstallation."
"Concerning the license, if I add one more device without a license, it will automatically subscribe to a license. I do not appreciate that."
"I would rate the scalability as seven out of ten. The capability is useful. Concerning the license, if I add one more device without a license, it will automatically subscribe to a license. I do not appreciate that."
"We have a lot of false positives we see in the dashboard. I think this is the only problem we are facing."
"I would like to see them add support for both Android and iOS smartphones."
 

Pricing and Cost Advice

"The product offers an amazing pricing structure. Price-wise, the product is very competitive."
"We are using the free, open-source version of this solution."
"Compared to other products such as Dynatrace, this is one of the cheaper options."
"When compared to other products, the price is average or on the low side."
"There is no charge for using the open-source version."
"The solution is free."
"The price is reasonable. It probably costs the same as ArcSight and LogRhythm SIEM. FortiSIEM might cost less than Elastic Security. There are no hidden or additional costs."
"The solution is not expensive and costs around ten dollars a month."
"The pricing is average."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Government
10%
Financial Services Firm
9%
Comms Service Provider
7%
Computer Software Company
18%
Comms Service Provider
11%
Non Profit
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
Elastic Security is considered cost-effective, especially at lower EPS levels. However, a direct comparison was not made due to different pricing structures.
What needs improvement with N-able EDR?
I do not have any ideas for improvement. It is a good solution, however, I am not an expert, so I do not have more ideas on this.
What is your primary use case for N-able EDR?
I use N-able EDR for monitoring the devices of my company.
What advice do you have for others considering N-able EDR?
The overall solution rating is seven out of ten. Scalability and integration could be improved, particularly with Microsoft tools.
 

Also Known As

Elastic SIEM, ELK Logstash
No data available
 

Overview

 

Sample Customers

Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Information Not Available
Find out what your peers are saying about Elastic Security vs. N-able EDR and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.