No more typing reviews! Try our Samantha, our new voice AI agent.

OpenText Security Log Analytics vs Panther comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 29, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

OpenText Security Log Analy...
Ranking in Security Information and Event Management (SIEM)
76th
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Panther
Ranking in Security Information and Event Management (SIEM)
41st
Average Rating
8.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
AI Data Analysis (26th)
 

Mindshare comparison

As of April 2026, in the Security Information and Event Management (SIEM) category, the mindshare of OpenText Security Log Analytics is 0.2%, up from 0.0% compared to the previous year. The mindshare of Panther is 1.0%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM) Mindshare Distribution
ProductMindshare (%)
Panther1.0%
OpenText Security Log Analytics0.2%
Other98.8%
Security Information and Event Management (SIEM)
 

Featured Reviews

Nagendra Nekkala. - PeerSpot reviewer
Senior Manager ICT & at Bangalore International Airport Limited
A stable and scalable solution that can be used for log management and analytics
Two admins are managing the solution in our organization. Firstly, you need to prioritize the security threats you are looking for. You also need to know the incident response and compliance activities you are looking for. That can help your organization to have a proper ROI. Overall, I rate ArcSight Recon an eight out of ten.
RT
Infosec Analyst at a tech vendor with 201-500 employees
Detection capabilities and helpful support team enhance log analysis and integration flexibility
I find Panther's detection capabilities and integrations to be highly valuable. It allows integration with anything as long as I am willing to write detections, and their team is very helpful. I find its log analysis capabilities valuable. It enables me to filter down to individual roles in AWS, and if I am skilled at SQL queries, I can query anything. The infrastructure as code feature allows me to use Git repositories to manage detections and import detections from other Git repositories.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Since ArcSight Recon gives proper log management for us, it helps me with my compliance purposes and any forensic investigation."
"I find Panther's detection capabilities and integrations to be highly valuable."
 

Cons

"The solution's speed has to be improved because more data analytics makes the application slower."
"The solution could be improved by providing more built-in integrations, which would reduce the need for me to build them myself."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
885,728 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Construction Company
15%
Manufacturing Company
12%
Computer Software Company
9%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Panther?
I find the pricing to be reasonable, although I can't recall the exact cost.
What needs improvement with Panther?
The solution could be improved by providing more built-in integrations, which would reduce the need for me to build them myself.
What is your primary use case for Panther?
We use Panther ( /products/panther-reviews ) for our SIEM ( /categories/security-information-and-event-management-siem ) solution. It is used for aggregating logs and analyzing user activities. We ...
 

Overview

 

Sample Customers

Information Not Available
Docker, Loom, Discord, Dropbox, HubSpot, Asana, GoFundMe, Zapier, Benchling, JupiterOne, Jumio, Bitstamp, Intercom, Randori, and Cedar
Find out what your peers are saying about Splunk, Wazuh, IBM and others in Security Information and Event Management (SIEM). Updated: March 2026.
885,728 professionals have used our research since 2012.