Share your experience using Blackberry AtHoc

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 84,000+ reviews on PeerSpot:

Security Engineer at a venture capital & private equity firm with 1,001-5,000 employees
Real User
Top 5
Provides real-time alerts and has efficient features for incident management
Pros and Cons
  • "Numerous data monitoring tools are available, but Coralogix somehow fine-tunes our policies and effectively supports our teams."
  • "It would be helpful if Coralogix could integrate the main modules that any organization requires into a single subscription."

What is our primary use case?

We use Coralogix to analyze our log metrics. We were looking for an enhanced tool to help us secure our real-time data.

How has it helped my organization?

We have integrated Coralogix with Slack and other tools, which has helped us receive real-time alerts. We don't have to constantly monitor the tool because it generates alerts and pushes them to us, providing notifications on Slack. This enhancement has strengthened our security, fulfilling our need when searching for such a tool. 

Numerous data monitoring tools are available, but Coralogix somehow fine-tunes our policies and effectively supports our teams. This SaaS platform utilizes machine learning for behavioral analysis of logs, yielding the results we need. For instance, there was a scenario where we received extension logs that were difficult to interpret. However, we obtained the analysis with the help of the product.

What is most valuable?

Almost all the features we currently use in our product subscription are important to us. Regarding alerting or incident management, incident alert mapping, and suppression rules, we utilize almost all the features available on Coralogix. Additionally, we are sending all the logs, such as app logs, EPC flow logs, etcetera.

What needs improvement?

Nowadays, tools are often divided into modules. It would be helpful if Coralogix could integrate the main modules that any organization requires into a single subscription. It would streamline the process for organizations like ours.

Merging some of the modules into a single subscription would be beneficial. Nowadays, modules are often separated, so if an organization needs additional modules after subscribing to one, they may have to purchase another subscription. Combining the availability module with tracing metrics or other relevant modules would be beneficial.

What do I think about the stability of the solution?

I rate the platform's stability a nine out of ten.

What do I think about the scalability of the solution?

I rate the platform's scalability an eight.

How are customer service and support?

We did contact the technical support team when we encountered a deployment issue with Cloudflare. They assisted us promptly and provided helpful answers within the expected time frame.

Which solution did I use previously and why did I switch?

Before adopting Coralogix, we relied on open-source solutions, but they needed to meet our needs effectively. It led us to explore and eventually invest in a commercial product.

What's my experience with pricing, setup cost, and licensing?

The platform has a reasonable cost. I rate the pricing a three out of ten.

Which other solutions did I evaluate?

We also evaluated Palo Alto and other Palo Alto products as potential solutions. We opted for Coralogix over Palo Alto because its subscription plan offered better visibility and more features.

What other advice do I have?

The alerting feature in Coralogix, integrated with Slack, has helped your team respond to incidents more quickly and effectively. We haven't experienced any incidents since implementation. Still, during the POC phase, the alerting feature proved to be prompt and reliable, assisting your team in promptly addressing potential issues.

It provides visualization tools that facilitate data analysis. These tools are available directly on the dashboard.

I recommend analyzing their organization's use case and scenario for new users. They should compare it with other tools to see if it suits their needs. If they find it suitable, then they should proceed with it. However, they should be prepared for the possibility that the tool may only suit some organizations. In our case, it worked well in pricing, scenario, and overall performance, so we opted to use it.


I rate it a nine out of ten.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
Dipesh Jain - PeerSpot reviewer
Manager IT at Power Finance Corporation Ltd
Real User
Has the ability to categorize alerts and reporting dashboards are useful
Pros and Cons
  • "The algorithm used in Seceon OTM is clear and logical, categorizing events as needed. This helps us identify and respond to threats effectively."
  • "For future releases, integrating incident response tools and improving communication on incident reporting could be beneficial."

What is our primary use case?

I use Seceon Open Threat Management Platform for security monitoring. It helps me track logs and events from various devices and take action on critical issues.

What is most valuable?

The algorithm used in Seceon OTM is clear and logical, categorizing events as needed. This helps us identify and respond to threats effectively. The ability to categorize alerts and the reporting dashboards are valuable features. AI-driven analysis aids in identifying critical alerts, and real-time threat detection improves our response time.              

What needs improvement?

I haven't encountered any major issues with Seceon OTM. The complexity of the activities and logs is expected, and I appreciate the detailed dashboards.

For how long have I used the solution?

I have been using Seceon Open Threat Management Platform for the past 1 year.

What do I think about the stability of the solution?

The solution is stable; I haven't experienced any issues.

What do I think about the scalability of the solution?

I'm not sure about the scalability of Seceon OTM as I haven't tested it yet, but since it's available on virtualized platforms, it should be scalable.

How are customer service and support?

Whenever we require to configure anything or need to have the specific reports from the data available in Sequana, we contact the support and receive a satisfactory result.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I haven't used similar solutions from other vendors; Seceon OTM is the only one I've worked with.

How was the initial setup?


I don't handle the deployment or management part directly, but I know it's easy to integrate Seceon OTM with other devices.

What's my experience with pricing, setup cost, and licensing?

I find Seceon OTM's pricing to be reasonable, not too high or low, just okay for the market standards. I can't disclose specific figures, we pay on a quarterly basis under a service model. I would rate it eight out of ten. As a customer, I always hope for better pricing options.

What other advice do I have?

I rate the solution a nine out of ten.

For future releases, integrating incident response tools and improving communication on incident reporting could be beneficial. My advice to others considering Seceon is to thoroughly assess their log collection and analysis needs and choose a leading solution in security monitoring.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate