Having a SIEM solution in general improves the way an organization functions, especially in the SOC part. With HPE ArcSight, we were able to deploy multiple dashboards, reports, and use case views that combine different views, data, and variables.
Product Specialist Security Solutions at a tech services company with 201-500 employees
The feature list allows us to input data dynamically to list it as a rule action.
How has it helped my organization?
What is most valuable?
One of the most valuable features is the Active List/Session List capability.
Multiple use cases were only possible to be created due to this feature list. The feature list allows us to input data dynamically to list it as a rule action.
For example: If you need to take a Source IP from an IPS event and put it in an ActiveList suspicious IP, you can create another rule for AntiVirus events where it only matches IPs within that list.
What needs improvement?
The main area is the GUI interface. Although a lot of improvements were made on the GUI in the last version (6.9.1), there are still a lot of configurations that need to be done using the console.
The console is not a bad tool to use. I personally like to use it. However, compared to competitive solutions (Splunk, QRadar), it appears to be a weakness.
What do I think about the stability of the solution?
In general, it is a very stable product. We did multiple implementations, and we never had any major issues.
As with any other solution that handles a large number of logs/data, regular fine-tuning is required. This fine-tuning makes sure that the system is doing what is supposed to do, with the capacity load that it was designed/sized to do
Buyer's Guide
OpenText Enterprise Security Manager
April 2025

Learn what your peers think about OpenText Enterprise Security Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
857,688 professionals have used our research since 2012.
What do I think about the scalability of the solution?
There were no scalability issues. A single Express/ESM Appliance is usually enough to support most of the enterprise’s needs. Only package upgrades need to be purchased. No hardware changes are necessary.
As for the loggers for long retention, you can add multiple loggers and cluster them as one virtual appliance. This provides for an easy scalability feature.
For the connectors part, you can implement as many connectors as you need so you can cover all your zones/branches. At a later time, a load-balanced connector for syslog can be introduced to make sure that logs for sensitive UDP packets are lost.
How are customer service and support?
We barely used the technical support assistance except for licensing. The times when we did use it, they were very good.
Which solution did I use previously and why did I switch?
We worked with RSA enVision/RSA SA as a partner:
- RSA enVision was very basic and was very hard to fine-tune.
- RSA SA (logs/packets) is more oriented towards packets/investigation and lacks multiple features when only using it for log management/SIEM.
How was the initial setup?
The initial setup was very easy. A fresh ESM/Express Installation with a connector can be up and running within a few hours.
With all of the best SIEM solutions, the biggest chunk of work comes later in creating customized rules, dashboards, use cases, and flex connectors for non-supported devices.
What's my experience with pricing, setup cost, and licensing?
In general, ArcSight solutions can cost a lot in big deployments. That comes as a result of having a big, scalable, stable, and feature-rich solution.
Which other solutions did I evaluate?
As a partner, we sell the product. We shifted from RSA to ArcSight based on our internal evaluations.
We tested McAfee Nitro, which was not mature enough at the time compared to ArcSight.
What other advice do I have?
Do a live PoC to test all needed features.
Think of use cases that you would like to deploy and make sure they are doable on the system, without additional licenses/appliances.
Choose a mature partner who is able to deliver the implementation even if it costs a bit more. The most common factor of failed SIEM experiences are due to bad implementations from non-experienced partners/engineers.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are partners with HPE.
Solutions Architect- SIEM and Solutions with 1,001-5,000 employees
Most devices are covered out-of-the-box. I would like to see high-end, predictive analytics.
What is most valuable?
The most valuable features are flexible setup of the architecture and large coverage of devices. Most devices deployed in enterprise environments are covered out-of-the-box by ArcSight. Unlike a few other solutions, the last-mile connectivity with ArcSight agent servers is free and flexible across all location deployments.
How has it helped my organization?
I have implemented it for a few organizations and they have benefited by early attack detection and usage of the right incident response mechanisms.
What needs improvement?
I would like to see high-end, predictive analytics. ArcSight ESM has some features that help in advanced correlation rules creation. However, intelligence around predictive analytics, understanding the current security posture and ability to map it with possible threats in the future is not something that is present in ArcSight at the moment.
For how long have I used the solution?
We’ve been using ArcSight for 3 years.
What do I think about the stability of the solution?
I have not had any issues with stability.
What do I think about the scalability of the solution?
I have not had any issues with scalability.
How is customer service and technical support?
I have never used technical support much, but will give it 3/5.
How was the initial setup?
The connectors are straightforward. The baselining is where the issues start.
What's my experience with pricing, setup cost, and licensing?
Licensing is straightforward, but the solution is fairly pricey.
Which other solutions did I evaluate?
We looked at QRadar and LogRhythm.
What other advice do I have?
Ensure your scope is very clear and so are the components.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
OpenText Enterprise Security Manager
April 2025

Learn what your peers think about OpenText Enterprise Security Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
857,688 professionals have used our research since 2012.
Information Security Specialist at a tech services company with 501-1,000 employees
Correlation and flexibility are valuable. It helped meet compliance requirements for log collection.
What is most valuable?
Correlation and flexibility are the most valuable features.
How has it helped my organization?
ArcSight saved time and effort responding to security incidents with one centralized console and helped to meet compliance requirements for log collection.
What needs improvement?
I would like to see improvement in the complexity involved to create a custom connector (flex). Other SIEM solutions, like QRadar, have addressed this.
For how long have I used the solution?
We have used ArcSight for 6 years.
What do I think about the stability of the solution?
Initial deployment of ArcSight is pretty challenging. It takes at least 3-4 months to install, integrate, define content and fine tune before starting the security operation.
How are customer service and technical support?
Customer service is fast in response, but very standard in their approach, which takes lot of time for simple issues.
Which solution did I use previously and why did I switch?
I have used RSA enVision, QRadar and Splunk. ArcSight is better than them all when it comes to filtering, normalization, aggregation, dashboards, reporting and correlation, multi-tenancy and custom devices support.
How was the initial setup?
Initial setup was complex as the integration of a custom application takes lot of time and effort. Then, fine tuning requires at least 6 weeks to analyze and tune each alert separately.
What about the implementation team?
We implemented through HPE itself and I would advise to go through a vendor as they would hand over the SIEM post-fine tuning which is a mammoth task.
What was our ROI?
ROI can be measured in terms of detected security incidents and compliance positive tests, which in turn boost the business. Our security incident count increased from 3 per month to 46 and all were real security threats. Had those gone undetected and realized, there would have been possible data theft, information stealing, damage of brand reputation, etc.
What other advice do I have?
An organization that has enough budget for SIEM and really cares about security and not only about compliance must go with ArcSight. SMB organizations who want to start a SOC or have just a log management solution for compliance requirements can go for cheaper options such as QRadar, LogRhythm, AlienVault, etc. For MSSP, ArcSight is indeed the best SIEM available in the market, as segregation of logs, access restriction, different log retention, customized view for dashboard and reports to clients are present with ease.
Lastly, ArcSight is like Apple. If you have money, go for iPhone and you will certainly not regret it. But if your budget is the primary constraint, then another SIEM must be explored.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Information Security Engineer at a tech services company with 501-1,000 employees
The user has multiple levels of options to generate reports and get alerted based on conditions.
Valuable Features
- Collection - Collects logs from a wide range of products, even those not supported by default and the users can develop a connector for log collection.
- Detection - Caliber to detect subtle attacks with a powerful correlation engine.
- Report/Alert - The user has multiple levels of options to generate reports and get alerted based on conditions.
Improvements to My Organization
By using ArcSight ESM and its correlation technology, it thwarts multiple attacks from external sources before exploitations such as SQL injection, UNIX password file attempt, brute force to published servers, and more.
In addition, internal frauds have been prevented through preventing unauthorized login attempts to the firewall, database, critical servers, etc.
Room for Improvement
ArcSight Connector appliance needs some improvement, as it has some bugs which triggers issues most of the time. I believe that the Connector is going to hit end-of-service.
Deployment Issues
We experienced no issues with the deployment.
Stability Issues
We had the bugs in Connector as detailed in the Areas for Improvement section.
Scalability Issues
We've had no issues with scalability.
Customer Service and Technical Support
Customer Service:
3.5*
Technical Support:Technical support should be improved. Many times, I've raised a case but none of them solved it and it took the guys from the Protect724 forum so solve my issue. The support team simply collects the logs from end users and makes you wait, and you carry on passing the same information which is available in the Admin guide.
Initial Setup
All you need is proper planning and pre-requisites information, and it's straightforward. Some newbies say that this product is hard to handle, but basically practice makes perfect.
Other Advice
HP are doing their job perfectly by bringing new features in every version, such as RepSM, HA capability, etc. It has never failed me.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Security Consultant & Solution Architect at a financial services firm with 10,001+ employees
It's able to track down security incidents faster and make for a more efficient investigation of a user's network activity based on the log data available.
Valuable Features:
- Alert correlation
- Reporting
- Retention
These are the features we find most valuable for us and which we use the most.
Improvements to My Organization:
It's able to track down security incidents faster and make for a more efficient investigation of a user's network activity based on the log data available.
Due simply to the user features available out-of-the-box, the convenience it can bring to any organization (when deployed and configured correctly) can greatly assist any enterprise in many facets, from an increased and enhanced security posture, to auditory regulations and even data retention.
Room for Improvement:
It needs additional and better user customization for SmartConnectors. It has additional device support for more obscure log sources.
Also needed is a configuration wizard for organizations lacking the in-depth knowledge required to integrate the solution successfully.
Deployment Issues:
We've had no issues with deployment.
Stability Issues:
We've had no issues with instability. It's been stable for us.
Scalability Issues:
We've been able to scale it for our needs. We've had no issues with scalability.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Solutions Architect at a comms service provider with 10,001+ employees
Scalable though it is not "plug-and-play".
Valuable Features:
- Scalable though it is not "plug-and-play".
- Various deployment configurations, based on requirements, budget and the EPS/GB per day
- Stable, performance predictable based on used capacity
- Integration with alerting/ticketing systems such as Tivoli
Improvements to My Organization:
- We use this product for managed SIEM services and its stability and maturity helps with standard deployments (hardly any surprises)
Room for Improvement:
- A bit on the slow side for reports requiring query of old data
- High availability achievable through complicated configurations (i.e. load balancers)
- The user interface is a bit dated
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Technology Officer (CTO) at a tech company with 501-1,000 employees
It enables us to speed our time to resolution.
What is most valuable?
- Security, understanding detection, intrusion, and how to do prevention and take action on an event that occurs from a security layer.
- Having a single solution that can actually manage the entire infrastructure, soup to nuts.
- Ability to detect and then take action on it.
How has it helped my organization?
Reducing my OPEX cost by reducing the overhead and training costs of employees and staff. Before we would have to have a large number of staff to be able to go in and do consulting opportunities, to mitigate and remediate security intrusions on given clients. Now using ArcSight, albeit there maybe a capital upfront cost to buy the software product, it enables us to speed our time to resolution.
What needs improvement?
ArcSight needs to go the same route that HPE's doing with the virtualization engine of the HP 380. Basically making it more of a single pane of glass to be able to deploy and take a tangible action on a security event. Today it takes still a lot of consulting dollars to go into trying to deploy ArcSight. You have to have a very powerful technologist or technologist team to deploy ArcSight at scale and be able to actually understand the events coming inbound and make the right tangible decisions from those points of ingress or points of notification. That today, albeit, not horribly hard, as long as you have a trained professional that knows the product. It would be nice to be able to basically make that a one pane of glass, much like HPE's done with the virtualization concept. It would make that pain point a little less. It's not going to make it perfect, but it would be nice to see improvement in that area.
What do I think about the stability of the solution?
My opinion from a stability's standpoint ... we don't have any issues. The product runs 24/7/365. Whenever HPE introduces a patch or an enhancement for security concerns, we've never had a problem being able to ingest that on the fly with little-to-no downtime outside of what's been expected from the release of the patch.
What do I think about the scalability of the solution?
I've not had any problems with scaling into tens of thousands of nodes. I guess the biggest problem you're going to have with that would be actually the compute power to make the tangible decisions that's needed on large-scale environments where you have hundreds of firewalls coming in from different points of ingress. That would be a concern, but again that's not because of the ArcSight, it's just basically that's compute power.
How are customer service and technical support?
It has improved substantially over the last two years. I'm going to rate them at 3/5 because when you call in the time to remediation is long right now. I'm not going to fault any one person on that. It's a complex security tool, so calling in and trying to get that omission, crystal ball appearance is difficult. I get that. Is there room for improvement? Of course there is.
Which solution did I use previously and why did I switch?
Well we have different tools out there, but the most common ones everybody's going to know about is Splunk. Feature, function and price was why we switched When we're able to actually deliver the similar features and functions, add in additional intellectual property from HPE with respect to decision trees of ArcSight and being able to take tangible actions on the stuff that's coming inbound, that's great. Other tools can do that. Now you're just talking about price in the industry. We're able to deliver the same features and functionality at a lower cost to the client, typically we'll win with ArcSight.
How was the initial setup?
Straightforward for the most part but there are limitations. For example in the virtualization engine of the J80, the Instant On, which is a OneView Instant On product line. It does work great, as long as you have your infrastructure. Our clients give us all the necessary requirements, such as the AD and IP address, the DNS, the subnets and stuff. As long as all that works seamlessly, then we can usually bind that HP 380, the Instant On into the infrastructure seamlessly. Does it always work smooth? No. But that's not necessarily HPE's fault, it's because the infrastructure doesn't always lend itself to easy integration.
What other advice do I have?
I'm going to rate it at a 9. There's always room for improvement, of course, and maybe I'll be fair and give it an 8.5. The only reason I would do that is because, again, coming up with that single pane of glass, easier management style, and more about deployment. You don't have to have that powerhouse technologist that knows every trick of the trade to go in and deploy it and get all the bells and whistles. Is that a perfect model that will ever be achieved? Of course not. Can there be improvement? Sure there can. What I'm shooting for is have an ArcSight solution that can get me 90 percent there, and then the customization of ArcSight will be reduced substantially, so that the customers' adoption of a new security style tool will be easier to swallow, and it will lend itself to a larger footprint over time as the customer builds comfort with the product.
With respect to the software on ArcSight, concept's the same on that. When we actually ask for improvements on the product, they've made those enhancements and made those fixes. Now with respect to me asking for a single pane of glass? I know they're working on it, I'm sure they are. It's a pain point that not only we have, but a lot of our customers have. If we're having the same conversation next year, I'll be disappointed. I'm hoping that the single pane of glass comes out soon.
Disclosure: My company has a business relationship with this vendor other than being a customer: We're a partner and reseller.
Information Security Advisor, CISO & CIO, Docutek Services at Docutek Services
Has helped us to gather, store, correlate and analyze security log data from many different information systems.
Valuable Features:
Intrusion Detection System (IDS)
Security Information and Event Management (SIEM)
Improvements to My Organization:
To organizations like mine, security information and event management products being introduced in the industry, as an outcome of several vulnerability, are able to provide real-time monitoring reporting and defense against these attacks. It has helped us to gather, store, correlate and analyze security log data from many different information systems.
Room for Improvement:
For this review, ArcSight sent me the Logger 4 7000-series appliance (2U) with six 1TB RADIUS drives, the maximum amount of internal storage available. I will like to see a threat analytics module. Also, the ability to produce reports.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partners

Buyer's Guide
Download our free OpenText Enterprise Security Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Product Categories
Security Information and Event Management (SIEM)Popular Comparisons
Microsoft Sentinel
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
LogRhythm SIEM
Rapid7 InsightIDR
Fortinet FortiSIEM
Google Chronicle Suite
Securonix Next-Gen SIEM
Sumo Logic Security
Buyer's Guide
Download our free OpenText Enterprise Security Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which is the best SIEM tool for a mid-sized financial services firm: Arcsight or Securonix?
- Exporting Nessus Data Logs to HP ArcSight ESM
- What Solution for SIEM is Best To Be NIST 800-171 Compliant?
- When evaluating Security Information and Event Management (SIEM), what aspect do you think is the most important feature to look for?
- What are the main differences between Nessus and Arcsight?
- What's The Best Way to Trial SIEM Solutions?
- Which is the best SIEM solution for a government organization?
- What is the difference between IT event correlation and aggregation?
- What Is SIEM Used For?
- RSA-EMC vs. other SIEM products?
Thanks I agree.