Elastic Security vs NetWitness Platform comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Elastic Security
Ranking in Log Management
5th
Ranking in Security Information and Event Management (SIEM)
5th
Average Rating
7.6
Number of Reviews
58
Ranking in other categories
Endpoint Detection and Response (EDR) (16th), Security Orchestration Automation and Response (SOAR) (6th), Extended Detection and Response (XDR) (7th)
NetWitness Platform
Ranking in Log Management
18th
Ranking in Security Information and Event Management (SIEM)
15th
Average Rating
7.4
Number of Reviews
36
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of June 2024, in the Log Management category, the mindshare of Elastic Security is 9.0%, down from 10.2% compared to the previous year. The mindshare of NetWitness Platform is 0.8%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
Unique Categories:
Security Information and Event Management (SIEM)
5.3%
Endpoint Detection and Response (EDR)
3.3%
 

Featured Reviews

Haroon Khand - PeerSpot reviewer
Aug 11, 2023
Enables users to know about the downtime and the errors in the code
We have different use cases. We implement it for the banking and healthcare sectors. It's the most useful for the e-commerce platforms that we deploy it for. The most important feature is Elasticsearch. They also use it for security. Elastic Security has been deployed in the National Bank of Dubai…
Salah Sabouni - PeerSpot reviewer
Apr 8, 2023
Provides comprehensive network visibility, and has available helpful support
The initial setup is complex. It requires some knowledge in order to set it up. If one is the most difficult and ten is the easiest, I would rate it a three out of ten. It's quite complex. Initially, we need to prepare the hardware boxes, whether they are physical or virtual or offered as a service. This involves imaging them with the appropriate functions for the module. Then, for network packet capture, the mirror ports must be connected to the packet capture box. Regarding logs, the configuration process involves making NetWitness boxes communicate with each other through the appropriate protocols and ports. Following this, the next step involves configuring the log sources to send logs to the log box. This process requires the appropriate rules to be configured to initiate log transmission and generate metadata by appropriate parsers on NetWitness. After the setup, the focus shifts to building correlation rules, alerts, and other monitoring activities. These rules and alerts are crucial components for effective monitoring. The deployment process can vary based on the specific environment and requirements, but typically it takes about one to two weeks to complete. Maintaining the solution doesn't require a large number of resources. Typically, one or two capable resources are sufficient to maintain the solution effectively. It's important to continuously monitor and ensure the health and proper functioning of the solution. This involves regularly checking the log sources to ensure that the logs are being ingested correctly and there are no issues such as overutilization or spikes in network traffic.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is very quick to react. I can set it to check anomalies or suspicious behavior every 30 seconds. It is very fast."
"ELK is open-source, and it will give you the framework you need to build everything from scratch."
"The cost is reasonable. It's not overly pricey."
"The solution is compatible with the cloud-native environment and they can adapt to it faster."
"It's a good platform and the very best in the current market. We looked at the Forester report from December 2022 where it was said to be a leader."
"Enables monitoring of application performance and the ability to predict behaviors."
"The most valuable features of the solution are the prevention methods and the incident alerts."
"The most valuable features of Elastic Security are it is open-source and provides a high level of security."
"The most valuable feature is the correlation. It can report in real-time and monitor the management."
"I can have enterprise security, email security, next generation firewall security log, HIDS and NIDS logs, etc. all on the same dashboard. It makes it easy to pinpoint or correlate our server to this. I can find out if there is lateral movement. This is the biggest advantage of this solution."
"NetWitness Platform is valuable for creating rules that the solution must detect."
"Offers a good wireless feature."
"The most valuable feature is that we can create our own connectors for any application, and NetWitness provides the training and tools to do it."
"The most valuable feature is the security that it provides."
"The software is scalable to whatever is required, and you can also put a lot of resources in the cloud."
"The newer 11.5 version that my team is using has found it to have good mapping."
 

Cons

"An area for improvement in Elastic Security is the pricing. It could be better. Right now, when you increase the volume of logs to be collected, the price also increases a lot."
"Better integration with third-party APMs would be really good."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"We'd like to see some more artificial intelligence capabilities."
"We set up a cron job to delete old logs so that we wouldn't hit a disk space issue. Such a feature should be available in the UI, where old logs can be deleted automatically. (Don’t know if this feature is already there)."
"There is room for improvement in the Kibana dashboard and in the asset management for the program."
"One thing they could add is a quick step to enable users who don't have a solid background to build a dashboard and quickly search, without difficulty."
"We'd like better premium support."
"RSA NetWitness Logs and Packets can improve the threat level aspect, it is lacking compared to other solutions. Whenever any hacking activity or any other threat factor occurred they used to provide the coverages very fast when comparing RSA NetWitness Logs and Packets. I heard the other three solutions, from a discussion with my team members who had experience in other solutions, they used to say that. Whenever any issues happened across the globe RSA NetWitness Logs and Packets are a little bit slow improving those detection mechanisms."
"The threat detection capability and centralizing and upgrading capability need to be improved. The threat alert capability needs to be improved as well because there is some lag time at present. They need to work on their database search too."
"There are instances where you try to run the reports and then it does not give you the desired outcome."
"The system looks like it is a mix of a bunch of different systems, and nothing looked like it was quite together."
"There is no support for this product in this country, so problems have to be resolved through global technical teams."
"The log system is a bit complex and has room for improvement."
"More customizability is required, which is something that they need to improve on."
"Health monitoring of the event sources and devices."
 

Pricing and Cost Advice

"This is an open-source product, so there are no costs."
"The pricing is in the middle. I think it is not an expensive experience if we compare it with big names, for example, QRadar, and also Oxide. I think Elastic Security is quite cheap. I would rate the pricing of this solution a five out of ten."
"It is easy to deploy, easy to use, and you get everything you need to become operational with it, and have nothing further to pay unless you want the OLED plugin."
"The base product is open-source but if you need advanced security features then you need to pay for the subscription. Elastic Security's price is reasonable in some cases and in other cases it's not."
"The tool's pricing is flexible and comes at unit cost. You don't have to pay for everything."
"When compared to other products, the price is average or on the low side."
"I find it better than Splunk in terms of cost-effectiveness. For cost-effectiveness, I would rate it a nine out of 10."
"Compared to other products such as Dynatrace, this is one of the cheaper options."
"Compared to the competition, the is price is not that high."
"The tool is very expensive, so I rate the pricing a ten out of ten. The solution has an annual subscription."
"It’s cheaper to run virtual machines in a VMware environment."
"This is a pricey solution; it's not cheap."
"Our license is for one year."
"In comparison to other SIEM solutions such as Splunk, NetWitness is less costly."
"It provides tools to assist in selecting the appropriate license and usage scenarios."
"We are on an annual license for the use of the solution."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
787,817 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
10%
Government
9%
Comms Service Provider
6%
Computer Software Company
16%
Financial Services Firm
15%
Government
10%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
Elastic Security is open-source. Unlike many older solutions where you must pay for data ingestion, Elastic allows you to ingest data freely. Being open source, you can set up a Kafka front door la...
What do you like most about NetWitness Platform?
The product's initial setup phase was not at all difficult.
What is your experience regarding pricing and costs for NetWitness Platform?
The product price was reasonable for my region and the market.
What needs improvement with NetWitness Platform?
From an improvement perspective, the NetWitness Platform needs to release new features and improve in areas like log correlation. The tool needs to have easier integrations with the cloud. Building...
 

Also Known As

Elastic SIEM, ELK Logstash
RSA Security Analytics
 

Learn More

Video not available
 

Overview

 

Sample Customers

Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Los Angeles World Airports, Reply
Find out what your peers are saying about Elastic Security vs. NetWitness Platform and other solutions. Updated: June 2024.
787,817 professionals have used our research since 2012.