We performed a comparison between Datto Endpoint Detection and Response (EDR) and Elastic Security based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"Ability to get forensics details and also memory exfiltration."
"The setup is pretty simple."
"Fortinet is very user-friendly for customers."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"The most valuable feature of Datto EDR is the visibility of the endpoints."
"Datto Endpoint Detection and Response is a perfect product for endpoint security."
"The insight that the solution provides is the most valuable aspect. The security scanning they do is excellent."
"One of the most valuable features of this solution is that it is more flexible than AlienVault."
"Stability-wise, I rate the solution a ten out of ten."
"The solution is quite stable. The performance has been good."
"It can handle millions of loads at a time, and you can always use the filters to find exactly what you are looking for and detect errors in every log message you are searching for, basically."
"It's open-source and free to use."
"We chose the product based on the ability to scan for malware using a malware behavioral model as opposed to just a traditional hash-based antivirus. Therefore, it's not as intensive."
"I like that it's a SIEM platform. I like that I can sell Elastic Security quickly. Elastic Security has a large community that can support users."
"ELK Logstash is easy and fast, at least for the initial setup with the out of box uses."
"Cannot be used on mobile devices with a secure connection."
"The support needs improvement."
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"FortiEDR can be improved by providing more detailed reporting."
"I haven't seen the use of AI in the solution."
"The only minor concern is occasional interference with desired programs."
"The solution should allow the automation of playbooks."
"The solution could improve by having more deployment methods."
"The deployment of the solution right now is terrible. We find it to be very bad. It could be improved enormously."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"Improvements in Elastic Security could include refining and normalizing queries to make them more user-friendly, enhancing the user experience with better documentation, and addressing any latency issues."
"The tool needs to integrate with legacy servers. Big companies can have legacy servers that may not always be updated."
"The biggest challenge has been related to the implementation."
"This solution cannot do predictive maintenance, so we have to build our own modules for doing it."
"There are connectors to gather logs for Windows PCs and Linux PCs, but if we have to get the logs from Syslog then we have to do it manually, and this should be automated."
"With Elastic Security, the challenge arises from the fact that there is a learning curve in relation to queries and understanding the query language provided to extract usable data."
"The price of this product could be improved, especially the additional costs. I would also like to see better-quality graphics."
More Datto Endpoint Detection and Response (EDR) Pricing and Cost Advice →
Datto Endpoint Detection and Response (EDR) is ranked 44th in Endpoint Detection and Response (EDR) with 3 reviews while Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 58 reviews. Datto Endpoint Detection and Response (EDR) is rated 7.6, while Elastic Security is rated 7.6. The top reviewer of Datto Endpoint Detection and Response (EDR) writes "Good security scanning, but has a complex setup and the stability isn't ideal". On the other hand, the top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". Datto Endpoint Detection and Response (EDR) is most compared with SentinelOne Singularity Complete, CrowdStrike Falcon, Bitdefender GravityZone EDR, Huntress and Microsoft Defender for Endpoint, whereas Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint. See our Datto Endpoint Detection and Response (EDR) vs. Elastic Security report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.