ArcSight ESM vs Log360

Last Updated:

Our analysts compared ArcSight ESM vs Log360 based on data from our 400+ point analysis of SIEM Tools, user reviews and our own crowdsourced data from our free software selection platform.

Product Basics

ArcSight, a robust software solution from OpenText, specializes in Security Information and Event Management (SIEM). It is designed to help organizations detect, analyze, and respond to security threats in real-time. ArcSight is particularly well-suited for large enterprises and government agencies that require comprehensive security monitoring and incident response capabilities due to its scalability and advanced analytics.

Key benefits of ArcSight include enhanced threat detection, improved compliance reporting, and streamlined security operations. Popular features encompass real-time event correlation, advanced threat intelligence, and extensive log management. Users appreciate its ability to handle large volumes of data and its integration with various security tools, although some note a steep learning curve.

Pricing for ArcSight can vary widely based on factors such as deployment size and specific requirements. For precise pricing details, it is recommended to contact SelectHub for a tailored quote. Overall, ArcSight stands out for its powerful analytics and comprehensive security features, making it a valuable asset for organizations with complex security needs.


Pros
  • Effective threat detection
  • User behavior analytics
  • Comprehensive security
  • Rich data source support
  • Automated incident response
Cons
  • Complex pricing model
  • Steep learning curve
  • Resource-intensive setup
  • High data ingestion rates
  • Not suitable for small businesses
read more...
Log360 is a comprehensive security information and event management (SIEM) solution designed to enhance an organization's cybersecurity posture. It is particularly well-suited for medium and large enterprises seeking to strengthen their security infrastructure. Log360 offers a range of key features, including log management, threat detection, incident response, and compliance reporting. Users have praised its ability to provide real-time threat intelligence and automated incident response. One user stated, "Log360's real-time threat detection has been instrumental in thwarting potential security breaches." However, some users have noted that the pricing structure may be on the higher side. Despite this, they believe that the investment is justified due to the product's robust capabilities. One user commented, "While the pricing may be a consideration, Log360's comprehensive features make it a valuable investment for our organization." Compared to similar products, users find Log360 to be a top choice, citing its ease of use and strong threat detection capabilities. They appreciate its ability to centralize logs and provide actionable insights, making it a vital tool for maintaining a secure IT environment. Overall, Log360 is favored for its contribution to proactively addressing cybersecurity threats.

Pros

  • Robust threat detection
  • Real-time monitoring
  • Incident response automation
  • Centralized log management
  • Comprehensive compliance reporting

Cons

  • Pricing considerations
  • Complex for small businesses
  • Steep learning curve
  • Resource-intensive
  • Integration challenges
read more...
Undisclosed
Get a free price quote
Tailored to your specific needs
$99 Monthly
Get a free price quote
Tailored to your specific needs
Small 
i
Medium 
i
Large 
i
Small 
i
Medium 
i
Large 
i
Windows
Mac
Linux
Android
Chromebook
Windows
Mac
Linux
Android
Chromebook
Cloud
On-Premise
Mobile
Cloud
On-Premise
Mobile
we're gathering data
Cisco
IBM
Northrop Grumman
Symantec

Product Assistance

Documentation
In Person
Live Online
Videos
Webinars
Documentation
In Person
Live Online
Videos
Webinars
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support

Product Insights

  • Enhanced Threat Detection: ArcSight's advanced analytics and correlation capabilities enable quicker identification of potential security threats, reducing the time to detect and respond to incidents.
  • Comprehensive Log Management: By aggregating and normalizing logs from various sources, ArcSight provides a unified view of security events, simplifying compliance and audit processes.
  • Scalability: Designed to handle large volumes of data, ArcSight can scale to meet the needs of growing organizations, ensuring consistent performance and reliability.
  • Real-Time Monitoring: Continuous monitoring of network activity allows for immediate detection of anomalies, helping to prevent breaches before they occur.
  • Customizable Dashboards: Tailored dashboards provide security teams with relevant, actionable insights, enhancing their ability to make informed decisions quickly.
  • Automated Response: ArcSight's automation capabilities streamline incident response processes, reducing manual intervention and minimizing the impact of security events.
  • Regulatory Compliance: Built-in compliance reporting tools help organizations meet regulatory requirements such as GDPR, HIPAA, and PCI-DSS, reducing the risk of non-compliance penalties.
  • Integration with Existing Tools: Seamless integration with other security and IT management tools enhances overall security posture by providing a more comprehensive defense strategy.
  • Historical Data Analysis: The ability to analyze historical data aids in identifying trends and patterns, improving future threat detection and prevention strategies.
  • Reduced Operational Costs: By automating routine tasks and improving efficiency, ArcSight helps lower the overall cost of security operations.
read more...
  • Automate Threat Detection & Response: Save time by automatically compiling data from several platforms like SaaS, IaaS, PaaS, exchange servers, applications and on-premise network devices in a centralized console. Accelerate threat resolution by automating incident response using workflow options.
  • Maximize ROI: Reduce upfront costs with low-cost enterprise-grade services. Minimize investment by leveraging service providers for implementation and quick deployment.
  • Ensure Privileged User Monitoring:  Eliminate the risk of privileged users going rogue by continuously monitoring user activities. Prevent insider attacks with regular reports on suspicious behavior.
  • Strengthen Compliance:: Maintain compliance with regulatory mandates like PCI, GLBA, DSS, HIPAA, FISMA, SOX and ISO 27001. Access audit-related report templates and get alerts to avoid violation risks and fines.
  • Prevent Security Event Threats:  Detect and prevent advanced threats like brute force attacks, privilege escalation and misuse, and data breaches with signature-based MITRE ATT&CK technique, ML-based behavior analytics, and integrated CASB and DLP capabilities.
  • Enhanced Threat Detection: Log360 provides robust threat detection capabilities that enable organizations to identify and respond to security threats in real-time. This benefit ensures proactive security measures and minimizes the risk of breaches.
  • Real-Time Monitoring: Users appreciate Log360's ability to offer real-time monitoring of their IT environments. This ensures that any suspicious activities or anomalies are immediately detected, allowing for swift action.
  • Incident Response Automation: Log360 streamlines incident response through automation. This benefit reduces the response time to security incidents, minimizing potential damage and data breaches.
  • Centralized Log Management: Log360 simplifies log management by centralizing log data from various sources. This centralization offers a comprehensive view of an organization's IT environment, facilitating easier analysis and troubleshooting.
  • Comprehensive Compliance Reporting: Users value Log360's capability to generate compliance reports. This feature aids in meeting regulatory requirements and streamlining compliance processes, ensuring data security and integrity.
read more...
  • Real-time Threat Detection: ArcSight provides real-time monitoring and analysis of security events, enabling quick identification and response to potential threats.
  • Advanced Correlation Engine: The software uses a sophisticated correlation engine to link disparate security events, helping to uncover complex attack patterns that might otherwise go unnoticed.
  • Scalability: ArcSight is designed to scale from small environments to large, enterprise-level deployments, ensuring consistent performance regardless of the size of the network.
  • Comprehensive Log Management: It offers extensive log collection, storage, and analysis capabilities, supporting a wide range of log formats and sources.
  • Compliance Reporting: ArcSight includes built-in compliance reporting templates for various standards such as PCI-DSS, HIPAA, and GDPR, simplifying the audit process.
  • Integration with Other Security Tools: The platform integrates seamlessly with other security solutions, including firewalls, intrusion detection systems, and endpoint protection tools, enhancing overall security posture.
  • Customizable Dashboards: Users can create personalized dashboards to visualize security data in a way that best suits their needs, providing clear insights into the security landscape.
  • Automated Incident Response: ArcSight supports automated workflows for incident response, reducing the time and effort required to address security incidents.
  • Machine Learning Capabilities: The software leverages machine learning algorithms to improve threat detection accuracy and reduce false positives.
  • Data Enrichment: ArcSight enriches raw security data with contextual information, making it easier to understand and act upon.
  • Role-based Access Control: It provides granular access control, ensuring that users only have access to the data and functionalities relevant to their roles.
  • Threat Intelligence Integration: The platform can incorporate threat intelligence feeds, enhancing its ability to detect and respond to emerging threats.
  • Forensic Analysis: ArcSight offers robust forensic analysis tools, allowing security teams to investigate incidents in depth and understand the full scope of an attack.
  • High Availability: The software is designed for high availability, ensuring continuous monitoring and protection even in the event of hardware failures.
  • Multi-tenancy Support: ArcSight supports multi-tenancy, making it suitable for managed security service providers (MSSPs) and large organizations with multiple departments or subsidiaries.
read more...
  • Incident Detection: Detect suspicious activities and malicious incidents with continuous log data monitoring, analysis and reporting. Get incident alerts with a real-time alert feature.
  • Security Analytics:  Spot network threats, intrusions and breaches by analyzing events from servers, network devices, Microsoft Office 365 platforms and exchange servers. Respond to anomalies with interactive dashboards and customized analytics reports.
  • Threat Intelligence: Stay on top of evolving threats with an integrated threat intelligence platform. Get updated information on the latest threats with a TAXII/STIX threat feed processor that retrieves global threat data and maintains a database of malicious IPs.
  • Incident Resolution: Automatically assign teams to security alerts and track the incident resolution progress. Automated workflows ensure the timely implementation of preventive measures against threats.
  • Cloud Monitoring: Continuously monitor and identify threats on cloud-based PaaS and IaaS platforms like Amazon web services, Microsoft Azure and SaaS solutions like Salesforce.
  • Data Security: Discover and prioritize personal and sensitive information throughout your Windows infrastructure with confidential data detection policies. Protect data from breach attempts with file integrity monitoring capabilities.
  • Forensic Analysis: Assess post-attack impact and identify attacking patterns to avoid future threats by analyzing event and log data. Automatically perform forensic analysis and mitigate the possibility of human error or oversight in drilling down data.
  • Event Correlation: Correlate information from various sources like endpoints, servers and intrusion prevention systems into a single console to get a comprehensive idea of the company’s security situation. Customize correlation rules and regulations with a custom rule builder and quickly detect and resolve security incidents.
  • User Entity and Behavior Analytics (UEBA): Identify anomalous activities in the network using analysis reports on even slight changes in user and entity behavioral patterns.
read more...

Product Ranking

#11

among all
SIEM Tools

#4

among all
SIEM Tools

Find out who the leaders are

Analyst Rating Summary

87
85
90
100
95
100
100
84
Show More Show More
Platform Capabilities
Security Orchestration, Automation and Response (SOAR)
Log Collection and Management
Security Compliance
Dashboards and Reporting
Dashboards and Reporting
Log Collection and Management
Security Orchestration, Automation and Response (SOAR)
User and Entity Behavior Analytics (UEBA)
Security Compliance

Analyst Ratings for Functional Requirements Customize This Data Customize This Data

ArcSight ESM
Log360
+ Add Product + Add Product
Dashboards And Reporting Log Collection And Management Platform Capabilities Security Orchestration, Automation And Response (SOAR) Threat Detection, Investigation And Response (TDIR) User And Entity Behavior Analytics (UEBA) 90 95 100 100 60 60 100 100 84 100 80 100 0 25 50 75 100
86%
0%
14%
100%
0%
0%
90%
0%
10%
100%
0%
0%
100%
0%
0%
83%
0%
17%
100%
0%
0%
100%
0%
0%
60%
0%
40%
80%
0%
20%
60%
0%
40%
100%
0%
0%

Analyst Ratings for Technical Requirements Customize This Data Customize This Data

86%
0%
14%
71%
0%
29%
94%
0%
6%
88%
0%
12%

User Sentiment Summary

Great User Sentiment 295 reviews
Excellent User Sentiment 62 reviews
86%
of users recommend this product

ArcSight ESM has a 'great' User Satisfaction Rating of 86% when considering 295 user reviews from 4 recognized software review sites.

94%
of users recommend this product

Log360 has a 'excellent' User Satisfaction Rating of 94% when considering 62 user reviews from 3 recognized software review sites.

3.7 (17)
4.4 (12)
n/a
4.6 (10)
4.1 (12)
n/a
4.5 (235)
4.8 (40)
3.4 (31)
n/a

Awards

SelectHub research analysts have evaluated ArcSight ESM and concluded it earns best-in-class honors for Platform Capabilities.

Platform Capabilities Award

Log360 stands above the rest by achieving an ‘Excellent’ rating as a User Favorite.

User Favorite Award

Synopsis of User Ratings and Reviews

Comprehensive Security: ArcSight is praised for its comprehensive security capabilities, offering a wide range of features for monitoring, detecting, and responding to security threats effectively.
Real-Time Monitoring: Users appreciate the real-time monitoring and alerting features that help them stay informed about security incidents as they occur, allowing for prompt responses.
Scalability: ArcSight is often commended for its scalability, making it suitable for large organizations with extensive security data and event logs to manage.
Compliance Capabilities: Organizations in regulated industries value ArcSight's compliance reporting features, which simplify the process of demonstrating adherence to regulatory requirements.
Incident Response: Users find the automated incident response workflows valuable in streamlining the identification and mitigation of security incidents, reducing response times.
Show more
Effective Threat Detection: Log360 is highly praised for its robust threat detection capabilities, allowing users to proactively identify and respond to potential security threats in real-time.
Real-Time Monitoring: Users appreciate Log360's ability to provide real-time monitoring of their IT environments, enabling them to detect and respond to suspicious activities promptly.
Incident Response Automation: Log360 streamlines incident response through automation, reducing response times and minimizing the impact of security incidents.
Centralized Log Management: The product's centralized log management feature simplifies log data collection from various sources, offering a comprehensive view of the organization's IT environment for analysis and troubleshooting.
Comprehensive Compliance Reporting: Log360's ability to generate comprehensive compliance reports is highly valued, as it simplifies compliance processes and helps organizations meet regulatory requirements effectively.
Show more
Complex Pricing: Users often find ArcSight's pricing model complex and challenging to predict accurately, especially when factors like data ingestion rates influence costs.
Steep Learning Curve: Some users report a steep learning curve when implementing and managing ArcSight due to its advanced features and complexity, which may require dedicated training and expertise.
Resource-Intensive Setup: The initial setup of ArcSight can be resource-intensive, necessitating the availability of hardware, software, and experienced personnel for optimal configuration.
High Data Ingestion Rates: Users note that high data ingestion rates can lead to increased costs, making it essential to monitor and manage data volume effectively to control expenses.
Not Suitable for Small Businesses: ArcSight's advanced features and pricing model are often considered impractical for small businesses with simpler security needs, limiting its suitability.
Show more
Resource-Intensive: Some users find that Log360 can be resource-intensive, which can pose challenges, especially for smaller organizations with limited hardware and IT resources.
Complex for Small Businesses: Small businesses may struggle with the complexity of Log360, as the feature set and learning curve might be beyond their specific needs and budget constraints.
Steep Learning Curve: Implementing Log360 can present a significant learning curve, and users may require dedicated training and onboarding efforts to make the most of the product.
Integration Challenges: Some users report challenges when trying to integrate Log360 with specific third-party applications and systems, which can disrupt workflows and necessitate additional effort.
Pricing Considerations: Pricing may be a limitation for some organizations, particularly those with budget constraints. Users should carefully consider the investment required to implement Log360.
Show more

Is ArcSight the right choice for your security needs? User reviews from the past year present a mixed bag. While ArcSight is praised for its powerful real-time correlation engine, which provides critical insights from security data, and its extensive integration options, making it a good fit for complex security environments, users also point out some significant drawbacks. A recurring concern is the product's complexity, which translates into a steep learning curve and makes it challenging to deploy and manage, especially for organizations with limited IT resources. For instance, setting up and customizing dashboards can be time-consuming. This complexity often necessitates dedicated training and expertise. Another common gripe is the product's hunger for hardware resources, which can lead to performance issues, especially for organizations dealing with high volumes of security data. While some users applaud its performance, others report slow search functionality, indicating that experience can vary. These factors make ArcSight a good fit for large enterprises with complex security needs and the resources to handle its demands. However, smaller organizations or those with limited IT staff and expertise might find it overwhelming and resource-intensive. They might be better served by a SIEM solution with a shallower learning curve and less demanding hardware requirements.

Show more

User reviews of Log360 reveal a generally positive sentiment, highlighting its strengths in centralized log management, real-time threat detection, and ease of use. One user remarked, "Log360 has helped us centralize our logs from all our systems, giving us a complete picture of our security posture. This makes it much easier to identify and investigate potential threats." Another user appreciated the real-time threat detection capabilities, stating, "Log360 has helped us prevent several security incidents by detecting suspicious activity before it could become a major problem." However, some users also mention challenges related to the initial setup and learning curve. One user commented, "Setting up Log360 can be a bit complex for first-time users." Another user noted, "The interface can be a bit overwhelming at first, but there are plenty of resources available to help you get up to speed." Overall, users believe that Log360 offers a powerful and comprehensive SIEM solution at a competitive price. They appreciate its user-friendly interface, extensive features, and cloud-based deployment. One user compared Log360 to other SIEM solutions, saying, "We considered several SIEM solutions, but Log360 offered the best combination of features and price." Another user highlighted Log360's unique cloud-based approach, stating, "We were looking for a SIEM solution that was easy to deploy and maintain, and Log360's cloud-based platform was perfect for us." Based on the user reviews, Log360 is a compelling choice for businesses of all sizes looking for a powerful and user-friendly SIEM solution. Its strengths in centralized log management, real-time threat detection, and ease of use make it a valuable tool for enhancing security posture and mitigating potential risks.

Show more

Screenshots

we're gathering data

Top Alternatives in SIEM Tools


Converged SIEM

Elastic Security

Exabeam

FortiSIEM

Gurucul

IBM QRadar

InsightIDR

Log360

LogRhythm

Microsoft Sentinel

Securonix

Splunk Enterprise Security

Sumo Logic

Trellix Enterprise Security Manager

USM Anywhere

Related Categories

WE DISTILL IT INTO REAL REQUIREMENTS, COMPARISON REPORTS, PRICE GUIDES and more...

Compare products
Comparison Report
Just drag this link to the bookmark bar.
?
Table settings