Flexibility, high ingestion rate, and complexity of use cases.
CISO and DPO at ValueLabs LLP
Good visibility into end-to-end communications helps discover security threats
Pros and Cons
- "ArcSight gives us better visibility into threats that were unknown earlier."
- "We would like the ability to easily identify either unused resources or those that are being used sub-optimally."
What is our primary use case?
How has it helped my organization?
ArcSight gives us better visibility into threats that were unknown earlier. We now have an ability to assess end-to-end communications, as well as alerts from various security solutions along the path.
What is most valuable?
The most valuable features are lists, correlation, escalation matrix, and customers.
What needs improvement?
The following needs to be improved:
- We would like the ability to easily identify either unused resources or those that are being used sub-optimally.
- ESM should make usage of variables and other such deep customizations, highly intuitive.
- User behavior analytics is too pricey but an essential tool.
Buyer's Guide
OpenText Enterprise Security Manager
April 2025

Learn what your peers think about OpenText Enterprise Security Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
857,688 professionals have used our research since 2012.
For how long have I used the solution?
We have been using ArcSight for eight years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Works at NOOSC Global
Helpful for detecting malware and intrusions, but needs support for devices that are absent of log files
Pros and Cons
- "For the typical malware or intrusion, this solution assists us by identifying the symptoms based on network traffic from the application servers."
- "The weakness in this system comes about because, with so many different logs, it is possible that the security analyst will lose information."
What is our primary use case?
We have a customer who is using this solution for information security monitoring.
How has it helped my organization?
For the typical malware or intrusion, this solution assists us by identifying the symptoms based on network traffic from the application servers. We are then able to prevent others from accessing critical information.
What is most valuable?
I really like the dashboard.
What needs improvement?
One of the problems for the security center is that there are many logs that need to be retrieved from a variety of network devices. The weakness in this system comes about because, with so many different logs, it is possible that the security analyst will lose information. I would like to have better support for wide-area data analytics.
Ideally, I would like to see ArcSight have the ability to consume raw information, or raw data, without being dependent on a log file.
For how long have I used the solution?
Between five and six years.
What do I think about the scalability of the solution?
There are more than six thousand users. However, because it is a log-based system, the scalability is limited. As such, our customer is looking for a solution that can scale better as the number of users and the number of devices in the infrastructure increases.
How are customer service and technical support?
There is not much in terms of support that is available for this solution. There are not many people with the competency for visualization and creating use cases.
How was the initial setup?
The initial setup of this solution is pretty complex. Once this installation is complete, we need to set up the use cases.
Deployment for this solution took between three and six months and was performed with four to five people.
What about the implementation team?
A reseller assisted our customer with the deployment.
What's my experience with pricing, setup cost, and licensing?
The cost of the solution is not very high, although hiring a qualified analyst to work with the product is expensive.
What other advice do I have?
In summary, this solution requires a dedicated person that has specific competency in this product. It is not a plug and play product that allows you to simply focus on the analytics. It is not easy for an amateur.
The suitability of this solution depends on the complexity of the system. If the organization is very large, for example nationwide, then a log-based approach such as this one will be very difficult to implement.
Obviously, if the device does not generate a log then it is not supported by this solution. Our client has successfully deployed it for use with several devices, including firewalls and IPS, but they have no support for some in-house applications.
I would rate this solution a five out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
OpenText Enterprise Security Manager
April 2025

Learn what your peers think about OpenText Enterprise Security Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
857,688 professionals have used our research since 2012.
Senior Officer IT at Tech Data Limited
Interactive dashboards provide lots of detail, but tough to operate for new users
Pros and Cons
- "I think that the overall experience with this solution is good, but in particular, I think that the dashboards are quite interactive."
- "It would be nice if the interface were more user-friendly, with, for example, a minimal number of tabs to navigate."
What is most valuable?
I think that the overall experience with this solution is good, but in particular, I think that the dashboards are quite interactive.
What needs improvement?
For somebody who is new and just starting with this product, they find it really tough. The software is quite big. It would be nice if the interface were more user-friendly, with, for example, a minimal number of tabs to navigate.
A walkthrough that shows everything a normal user might do would be very helpful.
I would like to see improvements on the Active Channel side of this solution.
For how long have I used the solution?
Between one and two years.
What do I think about the stability of the solution?
The software itself seems to be stable, as we have not actually experienced any bugs. The connection depends on the network side, but overall it seems to be working fine.
What do I think about the scalability of the solution?
This solution would be more scalable if the interface were more user-friendly. There are rules and alerts, and the user has to have the proper knowledge of all of these things. With a walk-through, I think that it would be quite easy to scale.
We have two people using this solution, and we perform monitoring on a daily basis. In our environment, adding users is quite rare.
How are customer service and technical support?
We did have a couple of problems recently where one of the modules was not communicating well. In terms of support, I think that they are quite good.
Which solution did I use previously and why did I switch?
This is the first solution that we have used for monitoring.
How was the initial setup?
I was not involved in the initial setup of this solution.
What other advice do I have?
This is a really good solution and I would recommend it. If you know how to work it, and how to configure it properly, then it can give you lots and lots of information. On the other hand, it provides so much detail that people can miss things. If the interface and reports were minimized and consolidated then it would be better.
I would rate this solution a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Manager at shinhan DS
Ease of connectivity with third-party products adds to the flexibility of this solution
Pros and Cons
- "This process has helped to improve our organization because we have centralized the intra-group security equipment logs."
- "There are several improvements that we would like to see, including: Building a system based on a log collection (SOC), a scenario for external encroachment, and Operator training."
What is our primary use case?
Our primary use case is to prioritize internationally used references.
How has it helped my organization?
This process has helped to improve our organization because we have centralized the intra-group security equipment logs.
We've been working hard to implement Violation scenarios as a rule.
What is most valuable?
The features that we have found to be most valuable are:
- Connectivity with the SOC system
- Flexible connectivity with third-party solutions
What needs improvement?
There are several improvements that we would like to see, including:
- Building a system based on a log collection (SOC)
- A scenario for external encroachment
- Operator training
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Manager at Royal Cemerlang
Enables us to minimize the damages of WannaCry attacks
Pros and Cons
- "When WannaCry attacks I can minimize the damage. My company had no protection at the time. We get alerts in ArcSight and then whenever a user got a copy of WannaCry and the WannaCry malware wants to connect to the mother ship, it alerts me in the ArcSight dashboard, and that helps us a lot. We then just go to the user and erase the malware."
- "In other products, I have found that they use some kind of GUI that is drag and drop. While in ArcSight they use still scripting. They should keep scripting because some people prefer scripting but they should have the option for those who prefer using drag and drop."
What is our primary use case?
Our primary use case if for analyzing cybersecurity.
How has it helped my organization?
When WannaCry attacks I can minimize the damage. My company had no protection at the time. We get alerts in ArcSight and then whenever a user got a copy of WannaCry and the WannaCry malware wants to connect to the mother ship, it alerts me in the ArcSight dashboard, and that helps us a lot. We then just go to the user and erase the malware.
What needs improvement?
In other products, I have found that they use some kind of GUI that is drag and drop. While in ArcSight they still use scripting. They should keep scripting because some people prefer scripting but they should have the option for those who prefer using drag and drop.
They should do something similar to what Splunk is doing. They have Enterprise Security and ArcSight should include some use cases that concentrate on Enterprise Security.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
It's quite stable.
What do I think about the scalability of the solution?
Our initial sizing is enough for our needs.
How was the initial setup?
The initial setup was straightforward. The correlation engine took us a lot of time. It took us three months to do the implementation. We required two staff for deployment.
What about the implementation team?
We used a partner for the implementation.
What's my experience with pricing, setup cost, and licensing?
The pricing is great compared to others.
Which other solutions did I evaluate?
At the time that we were looking into options, we did a PoC for Splunk. We found that ArcSight is more user-friendly than Splunk because Splunk uses more scripting in the configuration and initial setup.
What other advice do I have?
I would rate it an eight out of ten. Not a ten because of the drag and drop feature I'd like for them to include and because I think they should include more enterprise security use cases.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Analyst at a financial services firm with 10,001+ employees
Helps our clients with compliance and gives them real-time alerts and monitoring for their server data
Pros and Cons
- "We do consulting and I get feedback from our clients that the product really helped them with compliance, especially with GDPR."
- "I would like for them to integrate mobile devices. Integration or any kind of functionality which will act as a substitute for IBM so that we can really track our mobile devices as well as look at SIEM."
What is our primary use case?
We use this solution for clients that want database consulting. They have a lot of general user's data in that demise so they want to have a robust SIEM solution that they trust. They have real-time alerts and monitoring for their data server.
How has it helped my organization?
We do consulting and I get feedback from our clients that the product really helped them with compliance, especially with GDPR.
What needs improvement?
They should make a user manual for the technical people.
I would like for them to integrate mobile devices. Integration or any kind of functionality which will act as a substitute for IBM so that we can really track our mobile devices as well as look at SIEM.
What do I think about the stability of the solution?
I would rate the stability as a four out of five.
How was the initial setup?
The initial setup was easy. It was a two-month project plus one month setting up the best practices cost organization. In total, it was around a three month project.
What's my experience with pricing, setup cost, and licensing?
Pricing is average.
What other advice do I have?
I would rate this solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security and Business Data Protection Specialist at a comms service provider with 1,001-5,000 employees
The webpage algorithm is the most valuable feature because it is the fastest feature for searching logs, events, and correlation
Pros and Cons
- "The webpage algorithm is the most valuable feature because it was the fastest feature for searching the logs, events, and correlation."
- "The security area has room for improvement."
What is our primary use case?
It's the security analyst for incident response, forensic investigations, and security monitoring.
How has it helped my organization?
It has improved our organization because we had many investigations that it helped us with.
What is most valuable?
The webpage algorithm is the most valuable feature because it was the fastest feature for searching the logs, events, and correlation.
What needs improvement?
The security area has room for improvement.
For how long have I used the solution?
More than five years.
What other advice do I have?
I would rate this solution a seven out of ten. To make it a ten they should develop a design for the security operations. It's a SIEM solution and I can see that it has some segregation of the consoles and duties for the different parties when we want to monitor different components like the security operations center.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Manager at Royal Cemerlang
Can pinpoint the story behind every virus or network attack to the environment
Pros and Cons
- "It prevented my users from getting infected by ransomware. It can also pinpoint the story behind every virus or network attack to our environment."
- "The product should include a lot more predefined scenarios so the adopted company will have knowledge and a broader skill set in security and network."
What is our primary use case?
Our primary use case is SIEM. It is a data lake for logs from all of our servers and devices (routers, switches, firewalls, wireless controllers, etc.).
How has it helped my organization?
It prevented my users from getting infected by ransomware. It can also pinpoint the story behind every virus or network attack to our environment.
What is most valuable?
ArcSight ESM: The module has user-defined rules capabilities. This feature lets us define almost any threat.
What needs improvement?
The product should include a lot more predefined scenarios so the adopted company will have knowledge and a broader skill set in security and network.
For how long have I used the solution?
Three to five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free OpenText Enterprise Security Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Product Categories
Security Information and Event Management (SIEM)Popular Comparisons
Microsoft Sentinel
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
LogRhythm SIEM
Rapid7 InsightIDR
Fortinet FortiSIEM
Google Chronicle Suite
Securonix Next-Gen SIEM
Sumo Logic Security
Buyer's Guide
Download our free OpenText Enterprise Security Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which is the best SIEM tool for a mid-sized financial services firm: Arcsight or Securonix?
- Exporting Nessus Data Logs to HP ArcSight ESM
- What Solution for SIEM is Best To Be NIST 800-171 Compliant?
- When evaluating Security Information and Event Management (SIEM), what aspect do you think is the most important feature to look for?
- What are the main differences between Nessus and Arcsight?
- What's The Best Way to Trial SIEM Solutions?
- Which is the best SIEM solution for a government organization?
- What is the difference between IT event correlation and aggregation?
- What Is SIEM Used For?
- RSA-EMC vs. other SIEM products?
Weinstein have projects in goverment sector