

Gigamon Deep Observability Pipeline and Elastic Security are two leading products in the network visibility and security market. Users indicate that Gigamon offers superior support and pricing but Elastic Security is favored for its robust features, suggesting users find it worth the additional cost.
Features: User reviews highlight that Gigamon Deep Observability Pipeline excels in comprehensive data access, advanced threat detection, and integration capabilities. Elastic Security is praised for its analytics, search capabilities, and open-source flexibility. Elastic Security is noted for feature richness and flexibility, while Gigamon stands out for its depth in observability and threat detection.
Room for Improvement: Feedback for Gigamon indicates a need for a more intuitive setup process and enhanced reporting tools. For Elastic Security, users suggest improvements in performance optimization and better documentation. Gigamon requires enhancements in user onboarding, whereas Elastic Security needs to address performance and support documentation.
Ease of Deployment and Customer Service: Gigamon Deep Observability Pipeline's deployment model is seen as complex but strong customer support mitigates this. Elastic Security offers a relatively straightforward deployment process with satisfactory customer service. While Gigamon provides excellent service, the ease of deploying Elastic Security gives it an edge in this area.
Pricing and ROI: Gigamon users find the pricing competitive, noting tangible ROI benefits. Elastic Security, while perceived as more expensive, justifies the cost with extensive capabilities and high user satisfaction regarding ROI. Gigamon is more attractive for budget-conscious buyers, whereas Elastic Security delivers higher value through its feature set.
It does not require hefty security budgets and can be deployed for enterprise security effectively.
Most of the time when my team encounters issues, they receive responses within 24 hours.
Providing necessary assistance efficiently.
I have not faced any difficulties with Elastic Security, as we have a pretty good support service from them.
The technical support by Gigamon Deep Observability Pipeline is good because it has a local architect in my area.
Elastic Security is quite scalable.
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
In terms of stability, I would rate Elastic a solid eight out of ten.
Machine learning algorithms become better with time; as they ingest a huge volume of data, they become better.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
Elastic Security is considered cost-effective, especially at lower EPS levels.
Elastic Security offers good insight regarding alerts, reports, and cases.
Elastic Security offers advanced features such as machine learning and integration with ChatGPT.
We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data.
The Pipeline's Comprehensive Insights into data flows have helped improve operational efficiency and security.
| Product | Mindshare (%) |
|---|---|
| Elastic Security | 3.5% |
| Gigamon Deep Observability Pipeline | 0.5% |
| Other | 96.0% |

| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 12 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
Elastic Security stands out for its speed, scalability, and intuitive interface. It integrates seamlessly with Elasticsearch and Kibana, providing efficient data indexing, centralized log management, and intelligent threat identification, all while being open-source.
Elastic Security offers robust capabilities in security monitoring, threat identification, and SIEM functionalities. Its open-source nature enhances scalability, facilitating log aggregation and infrastructure monitoring. Users appreciate the intuitive dashboards and machine learning integration, which aid in proactive security measures and anomaly detection. Despite its strengths, improvements are needed in documentation, scalability, and configuration complexity. High data volume pricing and limited machine learning support are concerns, while dashboard enhancement and seamless integration with existing systems are desirable. The platform is widely used for alerting suspicious activities, analyzing logs from firewalls and Active Directory, and providing endpoint protection. It serves as a key tool for security awareness and auditing, integrating effectively with technologies like Kibana and OpenShift.
What are the most notable features of Elastic Security?Organizations deploy Elastic Security across industries for log aggregation and security monitoring, detecting unauthorized access, and analyzing system logs. It is essential for infrastructure monitoring and integrates effectively with systems such as Fluentd and OpenShift, supporting comprehensive security views across enterprise environments.
Gigamon Deep Observability Pipeline boosts network visibility and performance through features like NetFlow and deduplication, facilitating data flow insights and improved security. It supports traffic monitoring and management across various infrastructures.
Gigamon Deep Observability Pipeline enhances network management by offering features such as NetFlow, deduplication, header stripping, and packet filtering. These capabilities are instrumental in optimizing performance, offering users stability and improved encryption processes. Despite its robust hardware capabilities, it requires enhancements in security, filtering, and delivery time for hardware. Users note challenges with monitoring cloud networks and insufficient cluster capacity. There is also a call for improved interface design and internal traffic flow visualization.
What are the essential features of Gigamon Deep Observability Pipeline?Gigamon Deep Observability Pipeline finds application across industries for network visibility and management. It is used extensively for traffic monitoring, SSL inspection, mobile network oversight, and data center operations. Organizations leverage its capabilities to address network issues, enhance security, and streamline performance monitoring processes. Its ability to group traffic aids significantly in problem-solving and SSL detection.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.