ArcSight ESM vs Elastic Security

Last Updated:

Our analysts compared ArcSight ESM vs Elastic Security based on data from our 400+ point analysis of SIEM Tools, user reviews and our own crowdsourced data from our free software selection platform.

Product Basics

ArcSight, a robust software solution from OpenText, specializes in Security Information and Event Management (SIEM). It is designed to help organizations detect, analyze, and respond to security threats in real-time. ArcSight is particularly well-suited for large enterprises and government agencies that require comprehensive security monitoring and incident response capabilities due to its scalability and advanced analytics.

Key benefits of ArcSight include enhanced threat detection, improved compliance reporting, and streamlined security operations. Popular features encompass real-time event correlation, advanced threat intelligence, and extensive log management. Users appreciate its ability to handle large volumes of data and its integration with various security tools, although some note a steep learning curve.

Pricing for ArcSight can vary widely based on factors such as deployment size and specific requirements. For precise pricing details, it is recommended to contact SelectHub for a tailored quote. Overall, ArcSight stands out for its powerful analytics and comprehensive security features, making it a valuable asset for organizations with complex security needs.


Pros
  • Effective threat detection
  • User behavior analytics
  • Comprehensive security
  • Rich data source support
  • Automated incident response
Cons
  • Complex pricing model
  • Steep learning curve
  • Resource-intensive setup
  • High data ingestion rates
  • Not suitable for small businesses
read more...
Elastic Security is a comprehensive cybersecurity solution that seamlessly integrates with the Elastic Stack, providing a holistic approach to threat prevention and detection. Tailored for enterprises seeking robust security, its advanced features, such as behavioral analytics and anomaly detection, make it adept at identifying and mitigating sophisticated threats. Users appreciate its versatility, with one stating, "Elastic Security's scalability is unmatched, making it suitable for both SMEs and large corporations." While praised for its effectiveness, users note the learning curve, with another user remarking, "Initial setup can be complex." Despite pricing considerations, its performance is lauded, positioning it favorably against competitors.

Pros
  • Scalability for diverse organizational sizes.
  • Effective behavioral analytics and anomaly detection.
  • Seamless integration with the Elastic Stack.
  • Robust threat prevention and detection capabilities.
  • Continuous updates for evolving security landscapes.
Cons
  • Complex initial setup may pose a challenge.
  • Learning curve for optimal utilization.
  • Pricing considerations may impact budget.
  • Competition may offer more user-friendly interfaces.
  • Requires dedicated resources for effective deployment.
read more...
Undisclosed
Get a free price quote
Tailored to your specific needs
$99 Monthly
Get a free price quote
Tailored to your specific needs
Small 
i
Medium 
i
Large 
i
Small 
i
Medium 
i
Large 
i
Windows
Mac
Linux
Android
Chromebook
Windows
Mac
Linux
Android
Chromebook
Cloud
On-Premise
Mobile
Cloud
On-Premise
Mobile

Product Assistance

Documentation
In Person
Live Online
Videos
Webinars
Documentation
In Person
Live Online
Videos
Webinars
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support

Product Insights

  • Enhanced Threat Detection: ArcSight's advanced analytics and correlation capabilities enable quicker identification of potential security threats, reducing the time to detect and respond to incidents.
  • Comprehensive Log Management: By aggregating and normalizing logs from various sources, ArcSight provides a unified view of security events, simplifying compliance and audit processes.
  • Scalability: Designed to handle large volumes of data, ArcSight can scale to meet the needs of growing organizations, ensuring consistent performance and reliability.
  • Real-Time Monitoring: Continuous monitoring of network activity allows for immediate detection of anomalies, helping to prevent breaches before they occur.
  • Customizable Dashboards: Tailored dashboards provide security teams with relevant, actionable insights, enhancing their ability to make informed decisions quickly.
  • Automated Response: ArcSight's automation capabilities streamline incident response processes, reducing manual intervention and minimizing the impact of security events.
  • Regulatory Compliance: Built-in compliance reporting tools help organizations meet regulatory requirements such as GDPR, HIPAA, and PCI-DSS, reducing the risk of non-compliance penalties.
  • Integration with Existing Tools: Seamless integration with other security and IT management tools enhances overall security posture by providing a more comprehensive defense strategy.
  • Historical Data Analysis: The ability to analyze historical data aids in identifying trends and patterns, improving future threat detection and prevention strategies.
  • Reduced Operational Costs: By automating routine tasks and improving efficiency, ArcSight helps lower the overall cost of security operations.
read more...
  • Comprehensive Threat Detection: Elastic Security excels in identifying and mitigating a wide range of cyber threats, providing a robust shield against evolving security risks.
  • Scalability: Tailored to meet the needs of diverse organizations, Elastic Security's scalability ensures it remains effective for both small and large enterprises, adapting to changing workloads seamlessly.
  • Behavioral Analytics: Leveraging advanced behavioral analytics, the system intelligently detects anomalies, offering proactive defense by identifying potential threats based on user behavior patterns.
  • Integration with Elastic Stack: The seamless integration with the Elastic Stack enhances overall operational efficiency, allowing users to harness the power of a unified ecosystem for security and data management.
  • Continuous Updates: Elastic Security remains at the forefront of cybersecurity with regular updates, ensuring that it stays ahead of emerging threats and vulnerabilities, providing users with cutting-edge protection.
  • Adaptability: The system's adaptability is highlighted by its ability to evolve alongside technological advancements, making it a future-proof solution for organizations navigating dynamic cybersecurity landscapes.
  • Customizable Policies: Elastic Security empowers users with the flexibility to tailor security policies according to the unique needs of their organization, providing a personalized and adaptive defense strategy.
  • Incident Response Capabilities: In the event of a security incident, Elastic Security offers robust incident response capabilities, minimizing the impact of breaches and facilitating swift remediation processes.
  • Visibility and Monitoring: Users benefit from enhanced visibility into their IT environments, coupled with real-time monitoring capabilities, enabling proactive identification and resolution of security issues.
  • Regulatory Compliance: Elastic Security aids organizations in achieving and maintaining regulatory compliance by offering features and controls that align with industry-specific and global security standards.
read more...
  • Real-time Threat Detection: ArcSight provides real-time monitoring and analysis of security events, enabling quick identification and response to potential threats.
  • Advanced Correlation Engine: The software uses a sophisticated correlation engine to link disparate security events, helping to uncover complex attack patterns that might otherwise go unnoticed.
  • Scalability: ArcSight is designed to scale from small environments to large, enterprise-level deployments, ensuring consistent performance regardless of the size of the network.
  • Comprehensive Log Management: It offers extensive log collection, storage, and analysis capabilities, supporting a wide range of log formats and sources.
  • Compliance Reporting: ArcSight includes built-in compliance reporting templates for various standards such as PCI-DSS, HIPAA, and GDPR, simplifying the audit process.
  • Integration with Other Security Tools: The platform integrates seamlessly with other security solutions, including firewalls, intrusion detection systems, and endpoint protection tools, enhancing overall security posture.
  • Customizable Dashboards: Users can create personalized dashboards to visualize security data in a way that best suits their needs, providing clear insights into the security landscape.
  • Automated Incident Response: ArcSight supports automated workflows for incident response, reducing the time and effort required to address security incidents.
  • Machine Learning Capabilities: The software leverages machine learning algorithms to improve threat detection accuracy and reduce false positives.
  • Data Enrichment: ArcSight enriches raw security data with contextual information, making it easier to understand and act upon.
  • Role-based Access Control: It provides granular access control, ensuring that users only have access to the data and functionalities relevant to their roles.
  • Threat Intelligence Integration: The platform can incorporate threat intelligence feeds, enhancing its ability to detect and respond to emerging threats.
  • Forensic Analysis: ArcSight offers robust forensic analysis tools, allowing security teams to investigate incidents in depth and understand the full scope of an attack.
  • High Availability: The software is designed for high availability, ensuring continuous monitoring and protection even in the event of hardware failures.
  • Multi-tenancy Support: ArcSight supports multi-tenancy, making it suitable for managed security service providers (MSSPs) and large organizations with multiple departments or subsidiaries.
read more...
  • Advanced Threat Detection: Elastic Security employs sophisticated algorithms to identify and neutralize a wide array of cyber threats, ensuring comprehensive protection against evolving security risks.
  • Scalability: Designed to cater to the needs of diverse organizations, Elastic Security seamlessly scales to accommodate varying workloads, making it suitable for both small businesses and large enterprises.
  • Behavioral Analytics: Leveraging advanced behavioral analytics, the system intelligently detects anomalies in user behavior, providing proactive defense by identifying potential threats based on patterns.
  • Integration with Elastic Stack: Elastic Security seamlessly integrates with the Elastic Stack, providing users with a unified ecosystem for security and data management, enhancing overall operational efficiency.
  • Continuous Updates: Elastic Security prioritizes staying ahead of emerging threats with regular updates, ensuring users benefit from a cutting-edge solution that evolves with the dynamic cybersecurity landscape.
  • Adaptability: The system's adaptability ensures it remains relevant amid technological advancements, offering users a future-proof solution that can evolve alongside their organization's changing security needs.
  • Customizable Policies: Elastic Security empowers users with the flexibility to tailor security policies according to their organization's unique requirements, providing a personalized and adaptive defense strategy.
  • Incident Response Capabilities: In the event of a security incident, Elastic Security offers robust incident response capabilities, minimizing the impact of breaches and facilitating swift remediation processes.
  • Visibility and Monitoring: Enhanced visibility into IT environments, coupled with real-time monitoring capabilities, allows users to proactively identify and resolve security issues efficiently.
  • Regulatory Compliance: Elastic Security assists organizations in achieving and maintaining regulatory compliance by offering features and controls aligned with industry-specific and global security standards.
read more...

Product Ranking

#11

among all
SIEM Tools

#19

among all
SIEM Tools

Find out who the leaders are

Analyst Rating Summary

87
82
90
75
95
100
100
95
Show More Show More
Platform Capabilities
Security Orchestration, Automation and Response (SOAR)
Log Collection and Management
Security Compliance
Dashboards and Reporting
Log Collection and Management
Security Orchestration, Automation and Response (SOAR)
Threat Detection, Investigation and Response (TDIR)
Platform Capabilities

Analyst Ratings for Functional Requirements Customize This Data Customize This Data

ArcSight ESM
Elastic Security
+ Add Product + Add Product
Dashboards And Reporting Log Collection And Management Platform Capabilities Security Orchestration, Automation And Response (SOAR) Threat Detection, Investigation And Response (TDIR) User And Entity Behavior Analytics (UEBA) 90 95 100 100 60 60 75 100 95 100 100 60 0 25 50 75 100
86%
0%
14%
71%
0%
29%
90%
0%
10%
100%
0%
0%
100%
0%
0%
92%
0%
8%
100%
0%
0%
100%
0%
0%
60%
0%
40%
100%
0%
0%
60%
0%
40%
60%
0%
40%

Analyst Ratings for Technical Requirements Customize This Data Customize This Data

86%
0%
14%
82%
0%
18%
94%
0%
6%
63%
0%
37%

User Sentiment Summary

Great User Sentiment 295 reviews
Excellent User Sentiment 12 reviews
86%
of users recommend this product

ArcSight ESM has a 'great' User Satisfaction Rating of 86% when considering 295 user reviews from 4 recognized software review sites.

97%
of users recommend this product

Elastic Security has a 'excellent' User Satisfaction Rating of 97% when considering 12 user reviews from 1 recognized software review sites.

3.7 (17)
n/a
n/a
4.83 (12)
4.1 (12)
n/a
4.5 (235)
n/a
3.4 (31)
n/a

Awards

SelectHub research analysts have evaluated ArcSight ESM and concluded it earns best-in-class honors for Platform Capabilities.

Platform Capabilities Award

Elastic Security stands above the rest by achieving an ‘Excellent’ rating as a User Favorite.

User Favorite Award

Synopsis of User Ratings and Reviews

Comprehensive Security: ArcSight is praised for its comprehensive security capabilities, offering a wide range of features for monitoring, detecting, and responding to security threats effectively.
Real-Time Monitoring: Users appreciate the real-time monitoring and alerting features that help them stay informed about security incidents as they occur, allowing for prompt responses.
Scalability: ArcSight is often commended for its scalability, making it suitable for large organizations with extensive security data and event logs to manage.
Compliance Capabilities: Organizations in regulated industries value ArcSight's compliance reporting features, which simplify the process of demonstrating adherence to regulatory requirements.
Incident Response: Users find the automated incident response workflows valuable in streamlining the identification and mitigation of security incidents, reducing response times.
Show more
Scalability: Elastic Security is highly scalable, catering to the needs of both small businesses and large enterprises, adapting seamlessly to varying workloads.
Effective Threat Detection: Users appreciate Elastic Security's advanced threat detection capabilities, identifying and mitigating a wide array of cyber threats for comprehensive protection.
Seamless Integration: The solution seamlessly integrates with the Elastic Stack, providing users with a unified ecosystem for security and data management, enhancing operational efficiency.
Behavioral Analytics: Leveraging advanced behavioral analytics, Elastic Security intelligently detects anomalies in user behavior, enhancing proactive defense against potential threats based on patterns.
Continuous Updates: Users value Elastic Security's commitment to regular updates, ensuring the system evolves with the dynamic cybersecurity landscape, staying ahead of emerging threats.
Show more
Complex Pricing: Users often find ArcSight's pricing model complex and challenging to predict accurately, especially when factors like data ingestion rates influence costs.
Steep Learning Curve: Some users report a steep learning curve when implementing and managing ArcSight due to its advanced features and complexity, which may require dedicated training and expertise.
Resource-Intensive Setup: The initial setup of ArcSight can be resource-intensive, necessitating the availability of hardware, software, and experienced personnel for optimal configuration.
High Data Ingestion Rates: Users note that high data ingestion rates can lead to increased costs, making it essential to monitor and manage data volume effectively to control expenses.
Not Suitable for Small Businesses: ArcSight's advanced features and pricing model are often considered impractical for small businesses with simpler security needs, limiting its suitability.
Show more
Complex Initial Setup: Some users find the initial setup of Elastic Security to be complex, requiring dedicated time and expertise for effective configuration.
Learning Curve: A learning curve is noted by users, particularly in mastering the full range of features, which may require time and effort to become proficient.
Pricing Considerations: Users express concerns about the cost of implementation and ongoing usage, impacting organizations with budget constraints and affecting overall feasibility.
Competition in User-Friendly Interfaces: Some users prefer more user-friendly interfaces offered by competitors, influencing preferences based on ease of use and accessibility.
Resource Requirements: Effective deployment of Elastic Security may necessitate dedicated resources, including personnel and hardware, potentially posing challenges for some users.
Show more

Is ArcSight the right choice for your security needs? User reviews from the past year present a mixed bag. While ArcSight is praised for its powerful real-time correlation engine, which provides critical insights from security data, and its extensive integration options, making it a good fit for complex security environments, users also point out some significant drawbacks. A recurring concern is the product's complexity, which translates into a steep learning curve and makes it challenging to deploy and manage, especially for organizations with limited IT resources. For instance, setting up and customizing dashboards can be time-consuming. This complexity often necessitates dedicated training and expertise. Another common gripe is the product's hunger for hardware resources, which can lead to performance issues, especially for organizations dealing with high volumes of security data. While some users applaud its performance, others report slow search functionality, indicating that experience can vary. These factors make ArcSight a good fit for large enterprises with complex security needs and the resources to handle its demands. However, smaller organizations or those with limited IT staff and expertise might find it overwhelming and resource-intensive. They might be better served by a SIEM solution with a shallower learning curve and less demanding hardware requirements.

Show more

Users commend Elastic Security for its scalability, catering to both small businesses and large enterprises. The effective threat detection capabilities, seamless integration with the Elastic Stack, and advanced behavioral analytics contribute to its strengths in providing comprehensive cybersecurity. Users appreciate the commitment to continuous updates, ensuring the system stays ahead of emerging threats. However, some users highlight challenges, including a complex initial setup and a learning curve, requiring time and expertise. Pricing considerations impact organizations with budget constraints, and users note competition with more user-friendly interfaces from other products. Despite these limitations, users value Elastic Security's adaptability and customization options. Quotes from users include praise for its scalability: "Elastic Security's scalability is unmatched, making it suitable for both SMEs and large corporations." Some express concerns about the learning curve: "Initial setup can be complex." While users acknowledge the competition's user-friendly interfaces, they appreciate Elastic Security's robust features, especially in threat detection and adaptability.

Show more

Screenshots

Top Alternatives in SIEM Tools


Converged SIEM

Elastic Security

Exabeam

FortiSIEM

Gurucul

IBM QRadar

InsightIDR

Log360

LogRhythm

Microsoft Sentinel

Securonix

Splunk Enterprise Security

Sumo Logic

Trellix Enterprise Security Manager

USM Anywhere

WE DISTILL IT INTO REAL REQUIREMENTS, COMPARISON REPORTS, PRICE GUIDES and more...

Compare products
Comparison Report
Just drag this link to the bookmark bar.
?
Table settings