Elastic Security vs Tanium comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Fortinet FortiEDR
Sponsored
Ranking in Endpoint Detection and Response (EDR)
12th
Average Rating
7.8
Number of Reviews
32
Ranking in other categories
No ranking in other categories
Elastic Security
Ranking in Endpoint Detection and Response (EDR)
16th
Average Rating
7.6
Number of Reviews
58
Ranking in other categories
Log Management (5th), Security Information and Event Management (SIEM) (5th), Security Orchestration Automation and Response (SOAR) (6th), Extended Detection and Response (XDR) (7th)
Tanium
Ranking in Endpoint Detection and Response (EDR)
25th
Average Rating
7.4
Number of Reviews
15
Ranking in other categories
Server Monitoring (10th), Vulnerability Management (18th), Endpoint Protection Platform (EPP) (37th)
 

Market share comparison

As of June 2024, in the Endpoint Detection and Response (EDR) category, the market share of Fortinet FortiEDR is 7.4% and it increased by 62.0% compared to the previous year. The market share of Elastic Security is 3.3% and it increased by 59.3% compared to the previous year. The market share of Tanium is 3.6% and it increased by 38.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
Unique Categories:
No other categories found
Log Management
11.2%
Security Information and Event Management (SIEM)
5.3%
Server Monitoring
9.8%
Vulnerability Management
2.5%
 

Featured Reviews

RafaelTorres - PeerSpot reviewer
Feb 20, 2024
Valuable for remote work security and enhances endpoint protection effectively
At my last job, we used FortiEDR to secure endpoints for 8,000 employees across MacBooks and Linux machines, ensuring the protection of backups and VPN connections. In 2020, we faced a significant challenge with remote work in Brazil, where BitLocker was utilized. FortiEDR proved invaluable as it…
CK
Apr 12, 2024
Offers rapid access to data and indexes
Anomaly detection comes into play when conducting a threat investigation using threat intelligence or querying threats. Typically, security events stem from various sources, such as operating system logs, event logs, application logs, and security logs, all collected from different systems and traffic data. This data streams at an enormous rate, measured in events per second, often reaching millions. Therefore, the task involves running anomaly detection across these events to pinpoint those requiring analysis and further threat-hunting efforts. If you're using Kaspersky for event management or passing through data stream pipelines, Elastic can convert the data into a usable format for ingestion into the cluster. Integration with existing solutions is straightforward since Elastic is an open-source platform. Overall, I rate the solution an eight out of ten.
Jun 8, 2023
The solution is limited to a few classes, but it helps discover CIs and assets
Tanium is primarily used for CMDV (Configuration management database) discovery. Tanium is meant to discover CIs and assets It's a good tool, but that's about it. It's like any other discovery tool. It's very detailed, and it will allow you to do hardware and software. I was using it in a very…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Additionally, when it comes to EDR, there are more tools available to assist with client work."
"NGAV and EDR features are outstanding."
"The product detects and blocks threats and is more proactive than firewalls."
"The setup is pretty simple."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"Fortinet is very user-friendly for customers."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"We like Elastic Security because it's a REST API-based solution. That's the primary reason we use it."
"It is very quick to react. I can set it to check anomalies or suspicious behavior every 30 seconds. It is very fast."
"One of the most valuable features of this solution is that it is more flexible than AlienVault."
"The most valuable feature is the search function, which allows me to go directly to the target to see the specific line a customer is searching for."
"It's very stable and reliable."
"Elastic is straightforward, easy to integrate, and highly customizable."
"It's open-source and free to use."
"We chose the product based on the ability to scan for malware using a malware behavioral model as opposed to just a traditional hash-based antivirus. Therefore, it's not as intensive."
"The security features are very valuable."
"Threat hunting is a very good feature on Tanium. We have just started using it and have not used it extensively."
"The most valuable features of this solution are the consolidation of all historical data on device endpoints, security drivers, firmware, and Software version gaps."
"The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization."
"I would say Tanium is the best tool for vulnerability management."
"Tanium's most valuable feature is its instant discovery aspect."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"I like the tool's incident response and security patching."
 

Cons

"Making the portal mobile friendly would be helpful when I am out of office."
"The SIEM could be improved."
"The solution is not user-friendly."
"It takes about two business days for initial support, which is too slow in urgent situations."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"Email notification should be done the same way as Logentries does it."
"Elastic Security could improve the documentation. It would help if they were more simple and clean."
"If you compare this with CrowdStrike or Carbon Black, they can improve."
"Authentication is not a default in Kibana. We need to have another tool to have authentication and authorization. These two should be part of Kibana."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"Technical support could respond faster."
"The problem with ELK is it's difficult to administer. When you have a problem, it can be very, very difficult to rebuild indexes."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"Most of the time, agent-relative issues have to be more equipped with self-healing features. At times, the agent is there, but for some reason, it doesn't report a status. It gives certain problems that are obviously agent-based."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"The most painful thing is the interface. It's a bit unclear sometimes."
"The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization."
"Any movement into a SaaS solution has challenges since the processes and data flows are not well defined. Hence, you need to build it at the same time."
"The performance could improve in future releases. We have had performance issues in specialized web environments, but overall I think the problems are less than 2% of the computer systems being used."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
"They could improve the UI."
 

Pricing and Cost Advice

"The pricing is good."
"I would rate the solution's pricing an eight out of ten."
"I know it is tough to get big budget additions up front, but I highly recommend deploying environment wide and adding the forensic service."
"Fortinet FortiEDR is available at a very competitive price compared to the other products in the market."
"It is expensive and I would rate it 8 on the scale."
"The price is comprable to other endpoint security solutions."
"Offered at a high price"
"There are no issues with the pricing."
"There is no charge for using the open-source version."
"Compared to other products such as Dynatrace, this is one of the cheaper options."
"The solution is free."
"Its price is fine. Its licensing works on a yearly basis. We have to renew the license every year. I also have a good experience with Darktrace. When we buy Darktrace, we get training free of cost, which is not there in Elastic. We have to pay extra for training. There is certainly room for improvement."
"The product offers an amazing pricing structure. Price-wise, the product is very competitive."
"The licensing cost of Elastic Security is based on the daily ingestion rate. I can't recall the exact figure, but for 10GB of log action daily, it would cost around $20,000."
"It is easy to deploy, easy to use, and you get everything you need to become operational with it, and have nothing further to pay unless you want the OLED plugin."
"When compared to other products, the price is average or on the low side."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
"There is an annual license required to use this solution."
"It is higher than some competitors in the market."
"The solution offers value for money."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
"It's an expensive solution. It would be nice if the cost were lower."
"The solution is expensive but it's a good investment."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
787,061 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Government
8%
Manufacturing Company
8%
Financial Services Firm
8%
Computer Software Company
17%
Financial Services Firm
10%
Government
9%
Comms Service Provider
6%
Financial Services Firm
17%
Government
13%
Computer Software Company
11%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What's the difference between Fortinet's FortiEDR and FortiClient?
I suggest Fortinet’s FortiEDR over FortiClient for several reasons. For starters, FortiEDR guarantees solid protectio...
What do you like most about Fortinet FortiEDR?
We have FortiEDR installed on all our systems. This protects them from any threats.
What is your experience regarding pricing and costs for Fortinet FortiEDR?
We license it per employee, so as long as the employee count remains the same, the licensing won't change. We have it...
Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several time...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it con...
What is your experience regarding pricing and costs for Elastic Security?
Elastic Security is open-source. Unlike many older solutions where you must pay for data ingestion, Elastic allows yo...
What do you like most about Tanium?
Tanium’s linear-chain architecture is valuable.
What is your primary use case for Tanium?
We collect end-point data. We use it to make AI models and provide it to customers. I use Tanium’s sensors, collect d...
 

Also Known As

enSilo, FortiEDR
Elastic SIEM, ELK Logstash
No data available
 

Overview

 

Sample Customers

Financial, Healthcare, Legal, Technology, Enterprise, Manufacturing ... 
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life
Find out what your peers are saying about Elastic Security vs. Tanium and other solutions. Updated: May 2024.
787,061 professionals have used our research since 2012.