2018-12-05T11:40:00Z
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
  • 0
  • 13

What do you like most about AlienVault OSSIM?

Hi Everyone,

What do you like most about AlienVault OSSIM?

Thanks for sharing your thoughts with the community!

16
PeerSpot user
16 Answers
Midhun Kumar - PeerSpot reviewer
Head of Infrastructure at Pearl Data Direct
Real User
Top 10
2020-10-30T14:48:36Z
Oct 30, 2020

The most valuable feature is the logging capability.

Search for a product comparison
Stephen Hui - PeerSpot reviewer
Cybersecurity Architect at DataAssure
Reseller
2020-09-13T07:02:20Z
Sep 13, 2020

Its user-friendliness is the most valuable. It is very easy to use and explore. The dashboard is very well packaged and integrated. You don't have to spend a lot of time in configuring it and checking out the RPM etc.

It is also free and very powerful.

KB
System Administrator at a marketing services firm with 10,001+ employees
Real User
2020-08-05T06:59:29Z
Aug 5, 2020

You can customize the dashboards as well as the reporting.

Sharad Agrawal - PeerSpot reviewer
Co-Founder and Director - Information Technology at Techneow
Real User
2020-07-28T06:50:19Z
Jul 28, 2020

The threat policies of the solution are always very advanced and the best in the market. They are very persistent in terms of keeping up with security protocols.

RJ
Director at a tech services company with 51-200 employees
Real User
2020-07-16T06:21:09Z
Jul 16, 2020

Inbuilt IDS, inbuilt integration with threat intelligence platform and with vulnerability assessment modules.

FJ
Research Assistant at a tech services company with 51-200 employees
Real User
2020-06-17T10:56:01Z
Jun 17, 2020

Better than other SIEM solutions because almost everything can be integrated.

Find out what your peers are saying about AT&T, Elastic, Splunk and others in Security Information and Event Management (SIEM). Updated: November 2022.
657,397 professionals have used our research since 2012.
Jim Poehlman - PeerSpot reviewer
Chief Wealth Cybersecurity Architect at PWcyber
Real User
2020-02-23T06:17:04Z
Feb 23, 2020

The dashboard is the solution's most valuable aspect. It brings everything into one central point where I can actually look at it and go, "Okay, I understand what's going on."

Denis L - PeerSpot reviewer
Sales Solutions Engineer at a tech services company with 201-500 employees
Reseller
2019-09-12T09:09:00Z
Sep 12, 2019

OSSIM is the only solution that includes the large number of modules that we need: a vulnerability scanner, a network IDS system, a host IDS system.

Tamer Serag Ahmed - PeerSpot reviewer
Co-Founder at Besafe Technology
Consultant
2019-09-10T09:04:00Z
Sep 10, 2019

The most valuable features of this solution are the data correlation and vulnerability assessment.

BonganiMkwananzi - PeerSpot reviewer
Owner & Cyber Security Consultant at Sekurisor
Consultant
2019-09-03T08:57:00Z
Sep 3, 2019

The open vault component and the checking of vulnerabilities are the most valuable features. The page management helps with this. If you know how your device is vulnerable at least you can do something about it.

Kuzey Aksu - PeerSpot reviewer
Information Security Manager at a financial services firm with 201-500 employees
Real User
2019-08-28T09:52:00Z
Aug 28, 2019

You pay monthly for the solution. I think it's one of the best products. If you compare with other companies, like LogRhythm, etc., the top 8 or 10 CMs, I think Alien Vault has the best price-performance ratio.

S Mustafa Afzouni - PeerSpot reviewer
Development Manager at a tech services company with 51-200 employees
Real User
2019-08-19T05:47:00Z
Aug 19, 2019

The initial setup was straightforward. I didn't have any problems.

MohamedMohsen - PeerSpot reviewer
Founder & CEO at MnZ Technology Solutions
Reseller
2019-08-13T10:42:00Z
Aug 13, 2019

With AlienVault you get everything in one box.

IA
Chief Operating Officer at a insurance company with 201-500 employees
Reseller
Top 20
2019-08-13T06:03:00Z
Aug 13, 2019

The solution has a very good open source community, and whenever we have problems, we are always able to resolve it online.

AF
Cyber Security Specialist at AEC
Real User
2019-08-13T06:03:00Z
Aug 13, 2019

The solution is very stable. Compared to Qradar and Splunk, it's very stable.

RajaniKant Singh - PeerSpot reviewer
CISO with 1,001-5,000 employees
Real User
2018-12-05T11:40:00Z
Dec 5, 2018

The threat alerts it gives me from time to time on harmful code within the network, or if they are generating any network traffic, are very useful.

Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Sep 21, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 14 answers
AF
Cyber Security Specialist at AEC
Aug 13, 2019
I primarily use the solution for log collection.
MohamedMohsen - PeerSpot reviewer
Founder & CEO at MnZ Technology Solutions
Aug 13, 2019
Our primary use case for AlienVault is incident management. We started as a customer because one of our companies worked on it. Eventually, we started reselling the service.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Sep 21, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 14 answers
IA
Chief Operating Officer at a insurance company with 201-500 employees
Aug 13, 2019
The solution is open-source. You need to pay for support if you want it.
AF
Cyber Security Specialist at AEC
Aug 13, 2019
The solution is open-source, so there are no licensing costs.
Related Articles
Ertugrul Akbas - PeerSpot reviewer
Manager at ANET
May 11, 2021
Part of the SIEM problems enterprises face is failing to maintain it with the proper correlation rules. SIEM use cases or rules are 80% of the value of the product. All SIEM solutions have a correlation feature, but they are not the same. Before choosing a SIEM, you must check correlation capabilities. Each product has many different features and their advantages and limits. Some example...
Ertugrul Akbas - PeerSpot reviewer
Manager at ANET
Nov 11, 2022
The right SIEM tool varies based on a business’ security posture, its budget and other factors. However, the top SIEM tools usually offer the following capabilities: Scalability — Ensure the solution has the capability to accommodate the current and the projected growth. Log compatibility — Ensure that the solution is compatible with your logs Correlation engine — Does the solution have th...
2 out of 3 comments
MK
IBM Security, European Threat Management Sales Leader at IBM
May 11, 2021
Having the SIEM as a central feeder is a traditional solution architecture.  The question can be asked , do I have the right security platform ?.  As the interconnections to this traditional centralized solution will always need maintaining.  In the case of a Security platform this effort is removed.   
John Stanford - PeerSpot reviewer
Senior Network Architect / Network Team Leader at ICE Consulting. Inc.
May 12, 2021
A good Security Platform includes SIEM, UEBA, NTA, and SOAR! on a single pane of glass, but I agree all security platforms require constant maintenance to remain viable as a part of the security posture!
Related Articles
Ertugrul Akbas - PeerSpot reviewer
Manager at ANET
May 11, 2021
What Really Matters When Selecting a SIEM and How to Choose a SIEM Looking into the Correlation?
Part of the SIEM problems enterprises face is failing to maintain it with the proper correlat...
Ertugrul Akbas - PeerSpot reviewer
Manager at ANET
Nov 11, 2022
How to Select the Right SIEM Solution?
The right SIEM tool varies based on a business’ security posture, its budget and other factors. H...
Download Free Report
Download our free Security Information and Event Management (SIEM) Report and find out what your peers are saying about AT&T, Elastic, Splunk, and more! Updated: November 2022.
DOWNLOAD NOW
657,397 professionals have used our research since 2012.