

OpenText Enterprise Security Manager and Elastic Security compete in the enterprise-level security solutions category. Elastic Security seems to have the upper hand due to its cost-effectiveness and deployment flexibility, while OpenText provides more comprehensive enterprise solutions.
Features: OpenText Enterprise Security Manager offers high adaptability, comprehensive integration capabilities, and powerful correlation for handling large data volumes efficiently. Elastic Security is favored for its open-source nature, scalability, quick search capabilities, high speed, and customization potential.
Room for Improvement: OpenText Enterprise Security Manager needs an updated interface and easier usability. It requires significant expertise for optimal use and tuning. Elastic Security could improve with more built-in use cases, enhanced machine learning, and better documentation for setup and integration.
Ease of Deployment and Customer Service: OpenText provides versatile deployment options but often needs expert oversight. Its customer service has mixed reviews, particularly among government clients. Elastic Security allows flexible deployment across cloud environments and is easier for technically skilled users. Its customer service is viewed as moderate, with noted improvements.
Pricing and ROI: Elastic Security's open-source model makes it highly cost-effective, especially for SMEs, with essential features in its free version. OpenText Enterprise Security Manager’s high pricing is tailored for large enterprises seeking extensive solutions. Despite the cost, it offers satisfactory ROI in compliance and threat detection.
It does not require hefty security budgets and can be deployed for enterprise security effectively.
Most of the time when my team encounters issues, they receive responses within 24 hours.
Providing necessary assistance efficiently.
I have not faced any difficulties with Elastic Security, as we have a pretty good support service from them.
If I raise a P1 or P0 ticket, the response time is often delayed by four to eight hours.
Elastic Security is quite scalable.
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
It lacks some capabilities compared to other tools available in the market.
In terms of stability, I would rate Elastic a solid eight out of ten.
The stability of ArcSight Enterprise Security Manager (ESM) is not very robust.
Machine learning algorithms become better with time; as they ingest a huge volume of data, they become better.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
The integration aspect of ArcSight Enterprise Security Manager (ESM) needs improvement.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
Elastic Security is considered cost-effective, especially at lower EPS levels.
ArcSight Enterprise Security Manager (ESM) is very cheap compared to other tools.
Elastic Security offers good insight regarding alerts, reports, and cases.
Elastic Security offers advanced features such as machine learning and integration with ChatGPT.
We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data.
The ability to interpret data is highly valued.
| Product | Mindshare (%) |
|---|---|
| Elastic Security | 3.5% |
| OpenText Enterprise Security Manager | 1.4% |
| Other | 95.1% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 11 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 37 |
| Midsize Enterprise | 14 |
| Large Enterprise | 57 |
Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.
Additional offerings and benefits:
Finally, Elastic Security benefits from a global community of users who contribute to its threat intelligence, helping to enhance its detection capabilities. This collaborative approach ensures that the solution remains on the cutting edge of cybersecurity, with up-to-date information on the latest threats and vulnerabilities.
OpenText Enterprise Security Manager enables real-time threat detection through scalable and adaptable solutions, integrating seamlessly with multiple platforms for complex security scenarios across different environments.
OpenText Enterprise Security Manager offers extensive security monitoring capabilities, combining log analysis and incident management to enhance cybersecurity and compliance. Its powerful event correlation engine provides real-time alerts for rapid incident response. Users benefit from customizable dashboards and comprehensive log collection, making it a significant tool in the SIEM market. Flexible deployment options cater to both on-premises and cloud environments, supporting enterprises in managing IT infrastructure and threat detection efficiently.
What are the key features of OpenText Enterprise Security Manager?In industries such as finance, healthcare, and energy, OpenText Enterprise Security Manager is implemented for monitoring critical systems and ensuring compliance with regulatory needs. Enterprises leverage its capabilities for forensic investigations and active threat management, serving as a central hub for cybersecurity operations across diverse IT infrastructures.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.