

VMware Aria Operations for Logs and Elastic Security compete in the log management and security solutions category. VMware is favored for its integration capabilities, while Elastic is preferred for its security features.
Features: VMware Aria Operations for Logs is highly rated for integration with VMware products, correlating logs across platforms, and enhanced visualization. Elastic Security is known for advanced threat detection, an alerting system, and security insights that cater to security-specific needs.
Room for Improvement: VMware Aria Operations for Logs could enhance scalability, improve performance under heavy data loads, and address user performance issues. Elastic Security would benefit from easier configuration, a more approachable learning curve, and reducing complexity for new users.
Ease of Deployment and Customer Service: VMware Aria Operations for Logs is recognized for straightforward deployment within VMware environments and responsive customer service. Elastic Security has flexible deployment options but users find its support helpful yet occasionally inconsistent.
Pricing and ROI: VMware Aria Operations for Logs offers competitive initial setup costs with a positive ROI due to integration benefits. Elastic Security, though more expensive, justifies costs with a broad feature set and strong security outcomes, translating into substantial ROI over time.
It does not require hefty security budgets and can be deployed for enterprise security effectively.
Support is prompt and helpful.
Most of the time when my team encounters issues, they receive responses within 24 hours.
I have not faced any difficulties with Elastic Security, as we have a pretty good support service from them.
While support staff is knowledgeable, getting access to specialists can be challenging when dealing with the limits of a product.
Customer service and support have declined.
I did not need technical support because I am a professional with VMware.
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
Elastic Security is quite scalable.
Since payment is based on hardware, scalability impacts are managed more effectively than with other tools paid by data volume.
It's relatively easy to find individuals with the skills to work with VMware because it is a widely spread tool.
In terms of stability, I would rate Elastic a solid eight out of ten.
Managing a lot of data involves reliance on hardware and network performance, which are external factors that can affect stability.
It has been very stable, and every time I needed it, it was available and working.
VMware as a whole provides very stable tools.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
Machine learning algorithms become better with time; as they ingest a huge volume of data, they become better.
It would be beneficial to have a roadmap for these dashboards to ensure consistent functionality.
There is also dissatisfaction with Broadcom's broader attitude, which is prompting me to search for alternatives.
VMware Aria Operations for Logs is not a cost-effective tool.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
Elastic Security is considered cost-effective, especially at lower EPS levels.
Splunk, often paid by the terabytes, becomes expensive quickly if not managed carefully.
The price has risen significantly, and for smaller customers, the cost can be up to ten times more than before.
VMware comes with a lot of packages, however, it remains too expensive.
Elastic Security offers good insight regarding alerts, reports, and cases.
Elastic Security offers advanced features such as machine learning and integration with ChatGPT.
We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data.
This tool also provides greater insight when integrated with VMware infrastructure, making it more precise than other tools.
The most valuable features are log centralization and long-term retention for logs.
A valuable feature of VMware Aria Operations for Logs is its ability to allow personalization of dashboards and requests.
| Product | Mindshare (%) |
|---|---|
| Elastic Security | 3.2% |
| VMware Aria Operations for Logs | 1.4% |
| Other | 95.4% |

| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 11 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 9 |
| Large Enterprise | 12 |
Elastic Security stands out for its speed, scalability, and intuitive interface. It integrates seamlessly with Elasticsearch and Kibana, providing efficient data indexing, centralized log management, and intelligent threat identification, all while being open-source.
Elastic Security offers robust capabilities in security monitoring, threat identification, and SIEM functionalities. Its open-source nature enhances scalability, facilitating log aggregation and infrastructure monitoring. Users appreciate the intuitive dashboards and machine learning integration, which aid in proactive security measures and anomaly detection. Despite its strengths, improvements are needed in documentation, scalability, and configuration complexity. High data volume pricing and limited machine learning support are concerns, while dashboard enhancement and seamless integration with existing systems are desirable. The platform is widely used for alerting suspicious activities, analyzing logs from firewalls and Active Directory, and providing endpoint protection. It serves as a key tool for security awareness and auditing, integrating effectively with technologies like Kibana and OpenShift.
What are the most notable features of Elastic Security?Organizations deploy Elastic Security across industries for log aggregation and security monitoring, detecting unauthorized access, and analyzing system logs. It is essential for infrastructure monitoring and integrates effectively with systems such as Fluentd and OpenShift, supporting comprehensive security views across enterprise environments.
VMware Aria Operations for Logs provides simplicity, flexibility, and personalized dashboards. Users benefit from real-time analytics, centralized log management, and seamless integration with VMware infrastructure.
VMware Aria Operations for Logs effectively addresses infrastructure and security-related issues. Its real-time analytics and log centralization support capacity planning and virtual environment management. The intuitive interface allows easy monitoring and report generation, well-integrated with VMware infrastructure. Users appreciate the ability to filter, analyze anomalies, and generate forecasts, aiding in cost and resource optimization. Despite its advantages, there is a need for improvement in log partition flexibility, dashboard functionality, and third-party tool integration, with calls for better centralized monitoring and log retention policies. High licensing costs and the need for better documentation and training materials are additional concerns.
What are the key features of VMware Aria Operations for Logs?VMware Aria Operations for Logs is implemented for troubleshooting, log management, and system monitoring across infrastructures, assisting in identifying root causes efficiently. Users engage it for performance metrics analysis, infrastructure optimization, and capacity management, leveraging detailed dashboards for performance issue diagnosis and server virtualization.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.