We performed a comparison between Elastic Security and VMware Aria Operations for Logs based on real PeerSpot user reviews.
Find out in this report how the two Log Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's very customizable, which is quite helpful."
"The most valuable features are the speed, detail, and visualization. It has the latest standards."
"Enables monitoring of application performance and the ability to predict behaviors."
"The most valuable features of Elastic Security are it is open-source and provides a high level of security."
"It's open-source and free to use."
"It can handle millions of loads at a time, and you can always use the filters to find exactly what you are looking for and detect errors in every log message you are searching for, basically."
"The stability of the solution is good."
"It's simple and easy to use."
"The system's management and its alerts are the most valuable aspects of the solution."
"The events are notably more descriptive, aiding in security and event analysis. We've also integrated Sky Collector, providing valuable insights and solutions for troubleshooting."
"One of the most valuable features of vRealize Log Insight is that it gives you a clear forecast about your existing machines, for example, how long your machines could be supported and how long the remaining capacity is to host your machines. This is one of the best options available within vRealize Log Insight. Another valuable feature of the solution is automation. My company deploys a lot of automation when required in a very, very short period, and in a very uniform manner, and even if the automation is being deployed for different processes and departments, it's pretty much the same across the environment, so vRealize Log Insight helps reduce a lot of ambiguities and helps my company manage operational efficiencies well."
"Our current costs are too high, and this tool will help us to better optimize our infrastructure."
"The setup and installation are very easy."
"The tool helps my company deal with security and log analysis, which are very important areas for us...It is a scalable solution."
"The interface of the solution is good."
"The most valuable feature is server virtualization. It's been very useful."
"The solution's query building is not that intuitive compared to other solutions."
"I would like more ways to manage permissions and restrict access to certain users."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"Improvements in Elastic Security could include refining and normalizing queries to make them more user-friendly, enhancing the user experience with better documentation, and addressing any latency issues."
"We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"Anything that supports high availability or ease of deployment in a highly available environment would help to improve this solution."
"There is an area of improvement in the Logs list. The load list may need to be paginated as there are limits."
"Technical support should be improved."
"The solution should be more user-friendly. The user interface and dashboard could be simplified."
"The tool does not provide a centralized pane for monitoring."
"It's great for VMware, but it would be good if they had third-party logins."
"In the VMware environment, one area for improvement is the handling of VM failovers due to host failures, such as unexpected shutdowns from hardware issues. Currently, High Availability (HA) doesn't seem to recognize whether the VMs are online during failover, treating them as offline or unavailable."
"Integration with other vendors is something that could be improved, they could add more vendors."
"It needs better integration with third-party analytics tools."
"The monitoring landscape is getting bigger. When it comes to infrastructure monitoring, we need more visibility. VMware needs to integrate more related applications and third-party products. That would make it more appealing to an audience beyond the VMware team."
More VMware Aria Operations for Logs Pricing and Cost Advice →
Elastic Security is ranked 5th in Log Management with 58 reviews while VMware Aria Operations for Logs is ranked 10th in Log Management with 24 reviews. Elastic Security is rated 7.6, while VMware Aria Operations for Logs is rated 8.2. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of VMware Aria Operations for Logs writes "Gives a clear forecast about existing machines, and has an automation feature that helps in reducing a lot of ambiguities and managing operational efficiencies". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and LogRhythm SIEM, whereas VMware Aria Operations for Logs is most compared with Splunk Enterprise Security, LogRhythm SIEM, Graylog, IBM Security QRadar and Fortinet FortiAnalyzer. See our Elastic Security vs. VMware Aria Operations for Logs report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.