IT Central Station is now PeerSpot: Here's why
2018-08-15T07:13:00Z

What is your primary use case for McAfee ESM?

Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
3

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

PeerSpot user
Guest
1313 Answers

reviewer1614318 - PeerSpot reviewer
Top 20Real User

We use this solution for correlation, alerting, and log management. We are integrators.

2021-07-02T21:45:52Z
Steve Wiles - PeerSpot reviewer
Real User

We are using this solution primarily for SIEM logs.

2021-06-12T15:25:35Z
reviewer927423 - PeerSpot reviewer
Top 20Real User

We use it for malware detection and authentication or login failures.

2021-05-05T13:16:17Z
Selina Aldefolla - PeerSpot reviewer
Top 20Real User

We implement it in our hospital applications.

2021-03-24T15:37:52Z
reviewer1514295 - PeerSpot reviewer
Top 20Real User

I work with an integration company and implement tools such as McAfee ESM. We are an MSSP for a lot of clients. We gather their logs, correlate them, create rules, and assume the role of their SOC. We have skilled operators 24/7 who take care of these clients.

2021-02-19T15:47:06Z
reviewer1152327 - PeerSpot reviewer
Real User

We are using the solution for log analyzing endpoints and investigating all types of applications, files or network devices login collection.

2021-01-12T10:45:00Z
reviewer1427199 - PeerSpot reviewer
Top 20MSP

We use McAfee ESM for IT operations and a few security-related things.

2020-09-27T04:09:58Z
reviewer1369827 - PeerSpot reviewer
Real User

We are a service provider and we implement it for our customers, as well as use it internally. This is a SIEM product that makes up part of our overall security solution.

2020-06-25T10:49:15Z
Cybersecon67 - PeerSpot reviewer
Consultant

We use this solution to provide managed security services. We use loggers at the client site to generate logs for monitoring their devices. We handle the monitoring, administration, and troubleshooting of their endpoints. For some customers, we manage everything, while for other customers we only monitor their critical devices. We are using an on-premises deployment model.

2019-08-08T07:02:00Z
Victor Alexandrescu - PeerSpot reviewer
Consultant

We use this solution to monitor everything in our hybrid-cloud environment. This includes IoT devices and a couple of data centers.

2019-08-05T06:24:00Z
Business8c2a - PeerSpot reviewer
Real User

My primary use case for this solution is to secure the data on my laptop.

2019-05-16T06:50:00Z
it_user1033191 - PeerSpot reviewer
Real User

As a bank, we have different cases use cases that are typical for the industry.

2019-03-11T07:21:00Z
itmanager1231232 - PeerSpot reviewer
Real User

It has performed well and delivered the results that I have been looking for.

2018-08-15T07:13:00Z
Buyer's Guide
Security Information and Event Management (SIEM)
June 2022
Find out what your peers are saying about McAfee, Splunk, IBM and others in Security Information and Event Management (SIEM). Updated: June 2022.
610,336 professionals have used our research since 2012.