OpenText Enterprise Security Manager and Gigamon Deep Observability Pipeline provide security solutions, competing in the cybersecurity tools category. OpenText ESM has a slight advantage due to its strong event correlation capabilities and adaptability, though deployment complexity and support issues are noted. Gigamon offers superior network visibility but lacks some features that may limit advanced integrations.
Features: OpenText ESM is recognized for its vendor support versatility, robust tools, active channels, and comprehensive log collection with advanced threat detection. Gigamon's core strength is its network visibility and packet filtering, contributing extensively to network analysis.
Room for Improvement: OpenText ESM needs enhancements in adapting to high-availability needs, easier network modeling, and resolving performance bottlenecks. Gigamon should focus on expanding traffic inspection and improving public cloud integration limitations.
Ease of Deployment and Customer Service: OpenText ESM's deployment process is often seen as challenging due to its complex setup with frequent support delays and documentation gaps. Gigamon has a simpler deployment process but also faces customer service challenges, similar to support delays.
Pricing and ROI: OpenText ESM is perceived as expensive, justified by its features and ROI through security compliance. Its EPS-based pricing model may be cost-prohibitive. Gigamon, while premium-priced, offers reasonable pricing for its functionality, though it may be costly compared to broader alternatives. Both products provide return on investment albeit OpenText’s complexity may delay benefits realization.
The technical support by Gigamon Deep Observability Pipeline is good because it has a local architect in my area.
If I raise a P1 or P0 ticket, the response time is often delayed by four to eight hours.
It lacks some capabilities compared to other tools available in the market.
The stability of ArcSight Enterprise Security Manager (ESM) is not very robust.
The integration aspect of ArcSight Enterprise Security Manager (ESM) needs improvement.
ArcSight Enterprise Security Manager (ESM) is very cheap compared to other tools.
The Pipeline's Comprehensive Insights into data flows have helped improve operational efficiency and security.
The ability to interpret data is highly valued.
Gigamon Deep Observability Pipeline is a comprehensive network visibility solution that provides real-time insights into network traffic. It offers SSL inspection and mobile network monitoring for traffic monitoring purposes. The solution optimizes networks, aids in security inspection, and improves firewall performance. It is praised for its performance, power, straightforward integration, stability, and ease of initial setup.
With Gigamon, organizations can gain complete visibility into their network traffic, identify potential threats, and take proactive measures to prevent them. The solution is ideal for organizations of all sizes, including enterprises, service providers, and government agencies.
OpenText Enterprise Security Manager enables real-time threat detection through scalable and adaptable solutions, integrating seamlessly with multiple platforms for complex security scenarios across different environments.
OpenText Enterprise Security Manager offers extensive security monitoring capabilities, combining log analysis and incident management to enhance cybersecurity and compliance. Its powerful event correlation engine provides real-time alerts for rapid incident response. Users benefit from customizable dashboards and comprehensive log collection, making it a significant tool in the SIEM market. Flexible deployment options cater to both on-premises and cloud environments, supporting enterprises in managing IT infrastructure and threat detection efficiently.
What are the key features of OpenText Enterprise Security Manager?In industries such as finance, healthcare, and energy, OpenText Enterprise Security Manager is implemented for monitoring critical systems and ensuring compliance with regulatory needs. Enterprises leverage its capabilities for forensic investigations and active threat management, serving as a central hub for cybersecurity operations across diverse IT infrastructures.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.