Arista NDR vs Auvik Network Management (ANM) comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Arista NDR
Ranking in Network Traffic Analysis (NTA)
8th
Average Rating
9.0
Number of Reviews
14
Ranking in other categories
Network Detection and Response (NDR) (8th)
Auvik Network Management (ANM)
Ranking in Network Traffic Analysis (NTA)
3rd
Average Rating
8.8
Number of Reviews
173
Ranking in other categories
Network Monitoring Software (3rd), IT Infrastructure Monitoring (3rd), Network Troubleshooting (3rd), Cloud Monitoring Software (4th)
 

Mindshare comparison

As of June 2024, in the Network Traffic Analysis (NTA) category, the mindshare of Arista NDR is 6.5%, up from 4.9% compared to the previous year. The mindshare of Auvik Network Management (ANM) is 1.3%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Network Traffic Analysis (NTA)
Unique Categories:
Network Detection and Response (NDR)
5.6%
Network Monitoring Software
1.1%
IT Infrastructure Monitoring
0.6%
 

Featured Reviews

JG
Feb 10, 2021
Gives us network layer visibility into things that may not be covered by other monitoring tools, such as shadow IT
One concern I do have with Awake is that, ideally, it should be able identify high-risk users and devices and entities. However, we don't have confidence in their entity resolution, and we've provided this feedback to Awake. My understanding is that this is where some of the AI/ML is, and it hasn't been reliable in correctly identifying which device an activity is associated with. We have also encountered issues where it has merged two devices into one entity profile when they shouldn't be merged. The entity resolution is the weakest point of Awake so far. Even without that it's useful because with the MNDR team, they'll at least do some of that work for us and then we can follow up on certain things. But that is something that we would want to see improved. Because we have the MNDR team, in some ways we don't work as hands-on with the interface itself as we did before. But another thing that would be helpful would be easier ways to integrate it with other systems. The integrations seem to exist, but they're a little weak in terms of how easy they are to set up, or what kind of information can be pulled in. That's something they've said that they're working on, as part of their roadmap, but that is something that I would like to see improved.
BZ
May 27, 2024
The solution can manage hardware life cycles, so you can see which devices are reaching the end of their lives
Auvik is effective at scanning the network. It pulls information from devices automatically using the devices' login credentials, creates a network diagram, and displays the network logs. Interestingly, Auvik can manage hardware life cycles. You can see which devices are reaching the end of their lives. It does a built-in audit, but the solution's strength is automated discovery. Auvik does this really well. Auvik is easy to use. It's probably one of the best. The network map is something that has been undervalued in these solutions. They're often a secondary thing that network admins are left to build out on their own, and they don't work properly. With Auvik, the network map updates quickly on its own automatically, so it's quite helpful. When there's a problem or disconnection, you know, somewhere, it shows up right away. The network map updates in real-time, and I quickly started to trust that it's showing the correct information. It's constantly updating. It's easy to use and set up. You don't need to maintain it. It maintains itself. If the hardware in the system is disconnected or disabled, it continues to update the map.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This solution’s encrypted traffic analysis helps us stay in compliance with government regulations. It is all about understanding data exfiltration, what is ingressing and egressing in our network. One common attack vector is exfiltrating data using encryption. My capabilities to see potential data exfiltration over encrypted traffic is second to none now."
"The most valuable portion is that they offer a threat-hunting service. Using their platform, and all of the data that they're collecting, they actually help us be proactive by having really expert folks that have insight, not just into our accounts, but into other accounts as well. They can be proactive and say, 'Well, we saw this incident at some other customer. We ran that same kind of analysis for you and we didn't see that type of activity in your network.'"
"Arista NDR's scalability is very good, making it easy to add more hardware components. You can order additional hardware and integrate it by stacking it with the existing setup. This feature cannot be seen in other NDR tools."
"The most valuable feature is the ability to see suspicious activity for devices inside my network. It helps me to quickly identify that activity and do analysis to see if it's expected or I need to mitigate that activity quickly."
"The query language makes it easy to query the records on the network, to do searches for the various threat activities that we're looking for. The dashboard, the Security Knowledge Graph, displays information meaningfully and easily. I am able to find the information that I want to find pretty quickly."
"It gives us something that is almost like an auditing tool for all of our network controls, to see how they are performing. This is related to compliance so that we can see how we are doing with what we have already implemented. There are things that we implemented, but we really didn't know if they were working or not. We have that visibility now."
"When I create a workbench query in Awake to do threat hunting, it's much easier to query. You get a dictionary popup immediately when you try to type a new query. It says, "You want to search for a device?" Then you type in "D-E," and it gives you a list of commands, like device, data set behavior, etc. That gives you the ability to build your own query."
"The query language that they have is quite valuable, especially because the sensor itself is storing some network activity and we're able to query that. That has been useful in a pinch because we don't necessarily use it just for threat hunting, but we also use it for debugging network issues. We can use it to ask questions and get answers about our network. For example: Which users and devices are using the VPN for RDP access? We can write a query pretty quickly and get an answer for that."
"I like the way that it auto-configures itself to do the mapping."
"Auvik offers free monitoring for all devices except routers and firewalls. This includes devices like network-attached devices, PCs, and printers, making it cost-effective for monitoring a wide range of assets."
"The most valuable feature of Auvik is the comprehensive network management it provides."
"Auvik is easy to use. The first thing you see when you open it up is a map of the United States or wherever you are, and it shows the locations of all of your network endpoints. For discovery, you set credentials and manage the credentials and it tells you when it needs a new credential. So you just click the "Manage Credentials" button and it takes you to the right spot. You enter in a new credential and then it starts looking closer at the device. It can give you all kinds of information from inside the device's log. We use it for CIS logs and we use it for just regular logging. The CIS log was something I was looking for in the other products, just so we have a place for the CIS logs to congregate so we can look them up."
"I've found the topology mesh graph helpful, and I like the other features that factor into my work with Kubernetes."
"One feature that is the most valuable for me is that after we added all of our firewalls, every time we make any configuration change in the firewall, it creates a backup and retains the change history for months. We can see and find out when a change was done and what was the change. The best part is that if we want to compare the current config with the config from two weeks ago, the tool pulls up both config files and tells us what the difference is."
"I like the fact that it's easy to set up and learn our network. I've used some other systems where it takes a lot of time and effort to manage the monitoring system, so you get what you put into it. The nice thing about Auvik is that you put the credentials in, put the agent on the network, and it just does its thing. It sets up alerts that you would most likely turn on anyway without even having to do it. If you add another new device to the network, it detects it and sets alerts up for that device. With the other systems that I've used, I had to manually add those devices in and manually set the alerts for new devices. I like that it's an almost set-it-and-forget-it sort of system."
"Automatic network mapping, alerting functionalities, and TrafficInsights are valuable."
 

Cons

"They've been focused on really developing their data science, their ability to detect, but over time, they need to be able to tie into other systems because other systems might detect something that they don't."
"I would like to see the capability to import what's known as STIX/TAXII in an IOC format. It currently doesn't offer this."
"Awake Security needs to move to a 24/7 support model in the MNDR space. Once they do that, it will make them even better."
"One thing I would like to see is a little bit more education or experience on AWS cloud for their managed services team. We've explained how we have the information set up, that the traffic coming in goes to the AWS load balancer and then gets sent on to our internal servers... but when I get notices they always tell me this traffic is coming from the IPs belonging to the load balancers, not the source IPs. So a little bit more education for their team about how AWS manages the traffic might help out."
"I would like to see a bit more in terms of encrypted traffic. With the advent of programs that live off the land, a smart attacker is going to leverage encryption to execute their operation. So I would like to see improvements there, where possible. Currently, we're not going to be decrypting encrypted traffic. What other approaches could be used?"
"Arista NDR needs to open legal offices to be closer to customers and partners. It needs more visibility in the NDR market in the Middle East. While they are doing well, they lack sufficient engineers. They need to hire more engineers to meet the demand and expand their presence. The current team is good but not enough to fully capture the market."
"While the appliance is very good, and I think they're working on it, it would probably help if they integrated the management team cases into the appliance so that everything we are working on with them would be accessible on our platform, on the dashboard, on the portal. Right now, Awake is just an additional team that uses the appliance that we use and then we communicate with them directly. Communication isn't through the portal."
"One concern I do have with Awake is that, ideally, it should be able identify high-risk users and devices and entities. However, we don't have confidence in their entity resolution, and we've provided this feedback to Awake. My understanding is that this is where some of the AI/ML is, and it hasn't been reliable in correctly identifying which device an activity is associated with. We have also encountered issues where it has merged two devices into one entity profile when they shouldn't be merged. The entity resolution is the weakest point of Awake so far."
"It would be cool if they came out with an app, but running the browser isn't bad."
"The user interface could be less cluttered."
"There have been times when our SNMP community strings were incorrect or weren't updated for whatever reason, and Auvik kept trying to scan them. Changing it was a pain, and there wasn't a way to extract that from Auvik. I understand there are valid security reasons why we wouldn't want to do that sometimes. In those situations, we had to recreate those community strings and reapply them to various devices."
"I'd like to see an improvement in how we target individual devices."
"The logging features could be a little bit better polished, although that aspect is relatively new. It comes in as raw data, with different formats for different vendors. It's not immediately clear to people what's going on with some of that and you have to read through the codes. Some of the higher-end logging solutions, like Splunk, which is very expensive, can parse through it and correlate items better. Improvement to the logging features would be a value-add, but I'm still very happy that it exists."
"If I am an administrator, then I have to maintain, clean, and label that environment. Auvik's utility in that regard is cumbersome. It is hard to find where certain things are configured. Also, it is sometimes hard to figure out why Auvik is doing what it is doing."
"The map itself is a little clunky in terms of zooming in, zooming out, and moving around because you have to use the manual on-screen buttons as opposed to being able to click and drag."
"The tutorial could be a little bit more comprehensive."
 

Pricing and Cost Advice

"Because I represent a hedge fund, I have some leverage. I told them that they had to meet my conditions if they wanted me as a client. It was the same way with Awake. They wanted an initial four-year agreement. Initially, we signed on for a one-year contract, but they wanted the four-year deal when it came time for the renewal. I told them that I was not doing that. I said that they either had to do it on my terms, or I'd go somewhere else."
"We switched to Awake Security because they were able to offer a model that was significantly less expensive and the value that we get out of it is higher."
"The solution is very good and the pricing is also better than others..."
"Awake's pricing was very competitive. It's not a cheap option though. It's an investment to utilize it, but it's one that we decided was worth the cost, with the managed services. At our scale, it was a much better option to utilize their software and their managed services to handle this, rather than hiring another person to be an analyst. It was quite cost-effective for us."
"The pricing seems pretty reasonable for what we get out of it. We also found it to be more competitive than some other vendors that we've looked at."
"Awake Security was the least expensive among their competitors. Everyone was within $15,000 of each other. The other solutions were not providing the MNDR service, which is standard with Awake Security's pricing/licensing model."
"The solution has saved thousands of dollars within the first day. Our ROI has to be in the tens of thousands of dollars since October last year."
"Auvik is a good product and worth the premium price tag for a lot of people."
"While their pricing aligns with competitors, the benefit of having these additional devices monitored for free makes Auvik a compelling option."
"Auvik is a good product for the price. The license is reasonable. We took a chance on it and figured it would work for us. It did even more than we expected."
"Auvik's pretty good in terms of pricing. It can get pricey if you have multiple managed devices, but if it's just a simple network with only one or two firewall walls and smart switches, it's reasonable."
"It definitely costs more than some of the competitors that are out there. It's also better, so I understand why it's a little bit more expensive."
"I would love to be able to get into the tier with the sys logging and the NetFlow/sFlow. That tier is a little bit expensive for us. If that could come down a little bit in price, we would be using that everywhere."
"I love the pricing. It makes a lot of sense. It allows you to use your own metal, which is great because it enables us to go higher-end for some clients and lower-end for others... Even having the flexibility to switch clients between the Performance (expert) and the Essentials (simple) version of Auvik, on the fly, is really unheard of."
"The pricing is favorable."
report
Use our free recommendation engine to learn which Network Traffic Analysis (NTA) solutions are best for your needs.
787,779 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
12%
Manufacturing Company
8%
Educational Organization
7%
Computer Software Company
19%
Construction Company
11%
Educational Organization
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Arista NDR?
Arista NDR's scalability is very good, making it easy to add more hardware components. You can order additional hardware and integrate it by stacking it with the existing setup. This feature cannot...
What is your experience regarding pricing and costs for Arista NDR?
The tool's pricing is expensive but it is competitive.
What needs improvement with Arista NDR?
Arista NDR needs to open legal offices to be closer to customers and partners. It needs more visibility in the NDR market in the Middle East. While they are doing well, they lack sufficient enginee...
What do you like most about Auvik?
The most valuable feature for us in Auvik is the network topology.
What is your experience regarding pricing and costs for Auvik?
I like that you only have to pay for a minimum of five systems with an account, and you can monitor server software for free. Auvik only charges for certain devices, such as firewalls, switches, et...
What needs improvement with Auvik?
We schedule backups in the middle of the night, and a high volume of data passes through our networks during those backups because it backs up everything for a couple of hours. That generates alert...
 

Also Known As

Awake Security Platform
No data available
 

Learn More

 

Overview

 

Sample Customers

- Dolby Laboratories- Seattle Genetics- ARM Energy- Ooma- Prophix- Yapstone
Find out what your peers are saying about Arista NDR vs. Auvik Network Management (ANM) and other solutions. Updated: May 2024.
787,779 professionals have used our research since 2012.