Try our new research platform with insights from 80,000+ expert users

Elastic Security vs Huntress Managed SIEM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Elastic Security
Ranking in Security Information and Event Management (SIEM)
5th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
65
Ranking in other categories
Log Management (10th), Endpoint Detection and Response (EDR) (16th), Security Orchestration Automation and Response (SOAR) (7th), Extended Detection and Response (XDR) (9th)
Huntress Managed SIEM
Ranking in Security Information and Event Management (SIEM)
42nd
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Featured Reviews

SyedAli17 - PeerSpot reviewer
Centralized monitoring improves security posture through rapid data processing
The processing part of Elastic Security is very interesting for us since we handle almost 7,000 to 8,000 alerts per minute. We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data. Additionally, Elastic Security helps improve the security posture of Pakistan through centralized visibility and real-time processing.
Nick Fletcher - PeerSpot reviewer
Centralized management streamlines log collection while providing valuable resources
We use it for log collection on customers that have compliance requirements The single pane of glass management with the other security products we use from Huntress is incredibly valuable. It allows us to manage multiple Huntress products in a central place, and we don't have ten different…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The indexes allow you to get your results quickly. The filtering and log passing is the advantage of Logstash."
"The most valuable feature of Elastic Security is that you can install agents, and they are not separately licensed."
"Elastic Security is a highly flexible platform that can be implemented anywhere."
"It is scalable."
"ELK documentation is very good, so never needed to contact technical support."
"What customers found most valuable in Elastic Security feature-wise is the search capability, in particular, the way of writing the search query and the speed of searching for results."
"Elastic Security is applied within my cyber defense strategy by utilizing many modules such as EDR, GenAI, SOAR module and combines with the SIEM module."
"The most valuable features of Elastic Security are it is open-source and provides a high level of security."
"Huntress is a great company and incredibly helpful with deployment."
"The single pane of glass management with the other security products we use from Huntress is incredibly valuable."
 

Cons

"In terms of what could be improved with Elastic, in some use cases, especially on the advanced level, they are not ready made, so you'll have to write some scripts."
"Technical support could respond faster."
"Their visuals and graphs need to be better."
"An area for improvement in Elastic Security is the pricing. It could be better. Right now, when you increase the volume of logs to be collected, the price also increases a lot."
"It is difficult to anticipate and understand the space utilization, so more clarity there would be great."
"The biggest challenge has been related to the implementation."
"Better integration with third-party APMs would be really good."
"The interface could be more user friendly because it is sometimes hard to deal with."
"There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data."
"There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data."
 

Pricing and Cost Advice

"The product offers an amazing pricing structure. Price-wise, the product is very competitive."
"Elastic Security is free to use."
"This is an open-source product, so there are no costs."
"Compared to other tools, Elastic Security is a cheaper solution."
"We use the open-source version, so there is no charge for this solution."
"I can say that the product is cheaply priced."
"Elastic Stack is an open-source tool. You don't have to pay anything for the components."
"Affordable but with additional costs"
Information not available
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
865,295 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Government
10%
Comms Service Provider
8%
Financial Services Firm
7%
Insurance Company
27%
Computer Software Company
11%
Educational Organization
9%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
I am satisfied with the pricing, setup cost, and licensing cost. It is a pure 10.
What needs improvement with Huntress Managed SIEM?
There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data.
What is your primary use case for Huntress Managed SIEM?
We use it for log collection on customers that have compliance requirements.
 

Also Known As

Elastic SIEM, ELK Logstash
No data available
 

Overview

 

Sample Customers

Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Information Not Available
Find out what your peers are saying about Splunk, Wazuh, Microsoft and others in Security Information and Event Management (SIEM). Updated: August 2025.
865,295 professionals have used our research since 2012.