

OpenText Enterprise Security Manager and Cribl compete in the domain of data management and security intelligence. Based on feature-rich analytics and integration capabilities, Cribl appears to have the upper hand primarily due to its advanced real-time data processing and flexible routing.
Features: OpenText Enterprise Security Manager is known for its strong event correlation capabilities, robust third-party product integration, and ease of scalability with powerful analytics tools. In contrast, Cribl's standout features include real-time data transformation, the simplification of log collection from diverse sources, and flexibility in data routing and integration with multiple destinations.
Room for Improvement: OpenText Enterprise Security Manager users suggest enhancements in UI simplification, smoother cloud platform integration, and setup process refinement. Cribl users indicate needs for improved documentation, stronger logging capabilities, and better backward compatibility with legacy systems.
Ease of Deployment and Customer Service: OpenText Enterprise Security Manager offers primarily on-premises deployment with some hybrid cloud support, though customer service feedback is mixed, often citing slow responses. Cribl provides a more versatile deployment model between hybrid and on-premises setups, with generally positive reviews for customer service responsiveness and configuration support.
Pricing and ROI: OpenText Enterprise Security Manager's pricing varies with reports of affordability and high cost. Its ROI is linked to compliance and increased security incident detection, considered cost-effective yet potentially expensive at scale. Cribl is seen as more cost-effective, offering significant value and licensing flexibility, particularly favorable for large data volumes and reduced log management costs.
What we've seen is really an overall reduction of just shy of 40% in our ingest into our SIM platform versus prior to having Cribl.
The second thing is that data aggregation, sampling, and reduction that we're able to do of the data, lowering our overall data volume, both traversing the network as well as what's being stored inside of our final solutions.
In terms of reduction, we were able to save almost ~40% of our total cost.
They had extensive expertise with the product and were able to facilitate everything we needed.
Usually, within an hour, we get a response, and we are able to work with them back and forth until we resolve the issues.
If they could enhance their internal logging, we won't require Cribl support to engage.
If I raise a P1 or P0 ticket, the response time is often delayed by four to eight hours.
The infrastructure behind Cribl Search is also scalable as it uses a CPU and just spawns horizontally more instances as it demands and requires.
Compared to other SIEM tools I use, any slight change on the operating system end impacts a lot on our SIEM tools and other things, but Cribl performs well in that regard.
It's an enterprise version, and we have a good amount of users using this solution.
It lacks some capabilities compared to other tools available in the market.
Migrating from those SC4S servers to Cribl worker nodes has truly been a game-changer.
I would rate the stability as ten out of ten.
If the pipeline is down and we receive an alert that it's not sending information to the log collection platform for more than one or two hours, if we receive an alert, it would be great.
The stability of ArcSight Enterprise Security Manager (ESM) is not very robust.
A more stringent role-based access control feature would enhance security and allow granular control over what users can see and access.
If we can have more internal logs and more debug logs to validate the error, that would be beneficial because instead of reaching out to Cribl support, we can troubleshoot and find the root cause ourselves.
In terms of large datasets—whether they originated from network inputs, virtual machines, or cloud instances—ingesting the data into the destination was relatively easy.
The integration aspect of ArcSight Enterprise Security Manager (ESM) needs improvement.
Over time, the licensing cost has increased.
Cribl is very inexpensive, with enterprise pricing around 30 cents per GB, which is really decent.
They have a universal license that allows us to consume the portions of Cribl that we want to use or flex into other portions of Cribl.
ArcSight Enterprise Security Manager (ESM) is very cheap compared to other tools.
The data reduction and preprocessing capabilities make Cribl really unique.
Cribl has a feature called JSON Unroll or Unroll function that allows you to differentiate the events; each event will come ingested as a single log instead of piling it up with multiple events.
The Cribl UI is very simple and easy to use, particularly when working with data from various sources; it makes it very easy to create pipelines, add complex logic to those pipelines, and then gives you a preview of what your data looks like before applying that pipeline and what you get after.
The ability to interpret data is highly valued.
| Product | Market Share (%) |
|---|---|
| Cribl | 1.2% |
| OpenText Enterprise Security Manager | 1.6% |
| Other | 97.2% |

| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 5 |
| Large Enterprise | 17 |
| Company Size | Count |
|---|---|
| Small Business | 37 |
| Midsize Enterprise | 14 |
| Large Enterprise | 57 |
Cribl offers advanced data transformation and routing with features such as data reduction, plugin configurations, and log collection within a user-friendly framework supporting various deployments, significantly reducing data volumes and costs.
Cribl is designed to streamline data management, offering real-time data transformation and efficient log management. It supports seamless SIEM migration, enabling organizations to optimize costs associated with platforms like Splunk through data trimming. The capability to handle multiple data destinations and compression eases log control. With flexibility across on-prem, cloud, or hybrid environments, Cribl provides an adaptable interface that facilitates quick data model replication. While it significantly reduces data volumes, enhancing overall efficiency, there are areas for improvement, including compatibility with legacy systems and integration with enterprise products. Organizations can enhance their operational capabilities through certification opportunities and explore added functionalities tailored towards specific industry needs.
What are Cribl's most important features?Cribl sees extensive use in industries prioritizing efficient data management and cost optimization. Organizations leverage its capabilities to connect between different data sources, including cloud environments, improving both data handling and storage efficiency. Its customization options appeal to firms needing specific industry compliance and operational enhancements.
OpenText Enterprise Security Manager enables real-time threat detection through scalable and adaptable solutions, integrating seamlessly with multiple platforms for complex security scenarios across different environments.
OpenText Enterprise Security Manager offers extensive security monitoring capabilities, combining log analysis and incident management to enhance cybersecurity and compliance. Its powerful event correlation engine provides real-time alerts for rapid incident response. Users benefit from customizable dashboards and comprehensive log collection, making it a significant tool in the SIEM market. Flexible deployment options cater to both on-premises and cloud environments, supporting enterprises in managing IT infrastructure and threat detection efficiently.
What are the key features of OpenText Enterprise Security Manager?In industries such as finance, healthcare, and energy, OpenText Enterprise Security Manager is implemented for monitoring critical systems and ensuring compliance with regulatory needs. Enterprises leverage its capabilities for forensic investigations and active threat management, serving as a central hub for cybersecurity operations across diverse IT infrastructures.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.