Absolute Visibility vs. AlienVault OSSIM

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Absolute Visibility
Score 8.1 out of 10
N/A
Absolute Visibility is an adaptive endpoint security solution. It provides users with a persistent connection to all of their endpoints and the data they contain. The vendor says, by maintaining a two-way connection with each device, users have the insight they need to assess risk and apply remote security measures so they can protect each endpoint and the sensitive data it contains. This insight is delivered through a cloud-based console that requires no additional IT…N/A
AlienVault OSSIM
Score 8.6 out of 10
N/A
OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset discovery Vulnerability assessment Intrusion detection Behavioral monitoring SIEM OSSIM provides the basis for AlienVault's proprietary Unified Security…N/A
Pricing
Absolute VisibilityAlienVault OSSIM
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Absolute VisibilityAlienVault OSSIM
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
Absolute VisibilityAlienVault OSSIM
Top Pros
Top Cons
Features
Absolute VisibilityAlienVault OSSIM
Security Information and Event Management (SIEM)
Comparison of Security Information and Event Management (SIEM) features of Product A and Product B
Absolute Visibility
-
Ratings
AlienVault OSSIM
7.5
11 Ratings
4% below category average
Centralized event and log data collection00 Ratings9.410 Ratings
Correlation00 Ratings7.011 Ratings
Event and log normalization/management00 Ratings8.111 Ratings
Deployment flexibility00 Ratings8.211 Ratings
Integration with Identity and Access Management Tools00 Ratings9.36 Ratings
Custom dashboards and workspaces00 Ratings9.410 Ratings
Host and network-based intrusion detection00 Ratings9.29 Ratings
Data integration/API management00 Ratings5.32 Ratings
Behavioral analytics and baselining00 Ratings5.42 Ratings
Rules-based and algorithmic detection thresholds00 Ratings5.33 Ratings
Response orchestration and automation00 Ratings6.32 Ratings
Reporting and compliance management00 Ratings8.44 Ratings
Incident indexing/searching00 Ratings6.43 Ratings
Best Alternatives
Absolute VisibilityAlienVault OSSIM
Small Businesses
NinjaOne
NinjaOne
Score 9.2 out of 10
AlienVault USM
AlienVault USM
Score 8.0 out of 10
Medium-sized Companies
NinjaOne
NinjaOne
Score 9.2 out of 10
InsightIDR
InsightIDR
Score 8.6 out of 10
Enterprises
Citrix Endpoint Management
Citrix Endpoint Management
Score 8.3 out of 10
InsightIDR
InsightIDR
Score 8.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Absolute VisibilityAlienVault OSSIM
Likelihood to Recommend
9.5
(2 ratings)
9.3
(11 ratings)
Usability
-
(0 ratings)
8.0
(1 ratings)
Support Rating
-
(0 ratings)
7.9
(3 ratings)
User Testimonials
Absolute VisibilityAlienVault OSSIM
Likelihood to Recommend
Absolute
I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information or devices that contain proprietary information, critical business information or other information that needs to be securely protected. It can also be used to track a device (individual) as well if that is your goal. We use it as an extra precaution to track our mental health clinicians that do home visits. It allows us to keep track of their whereabouts, in case an issue arises at a client's home. We are able to send someone out to check or assist, alert emergency services or send law enforcement if a situation should arise.
Read full review
AT&T Cybersecurity
If this is your first experience with a SIEM, this one can get you started. Take the time to learn the ins and outs of the product and you'll most likely be satisfied with it if your company is an SMB. If you need compliance reports, OSSIM is too small for you, you'll need to go with USM or USM Anywhere.
Read full review
Pros
Absolute
  • I tracked a stolen computer all the way to Africa from USA and disabled it.
  • I set up geofences with alerts. As soon as a computer got a wifi connection outside of our fences it would email me its current location.
  • Absolute's persistent technology was helpful. -Even when a pawn shop would attempt to "wipe" a device before getting it online, as soon as it got online it notified me of the OS re-installation and current location. We could call authorities and they could recover the device for us. And they were happy it made their job easier and deterred the pawn shop from reselling stolen devices.
Read full review
AT&T Cybersecurity
  • Asset discovery. Once installed in a centric, network-accessible server, OSSIM can poll all your endpoints with common protocols (SSH, SNMP, WMI) to detect and discover site-wide assets to monitor. You only need to group them by your own criteria once added to the product.
  • SIEM Event Correlation. You can define quite complex correlation rules to detect possible suspicious or malicious actions or attempts in your network, in order to categorize them as real threats or as false positives, thus streamlining your risk assessment and management.
  • Ease of installation. The entire AlienVault OSSIM is self-contained in an ISO file, which can be burned into a DVD or just mounted in your server of choice (physical or virtual) for deployment. The installation process is automated and quote verbosed, with options for static IP, email messaging and others.
  • Ease of access. Being AlienVault OSSIM a self-contained appliance, it can be accessed via web by any device that supports a web browser, being that desktops, workstation, mobile devices, etc. The OSSIM dashboard and other features are automatically rearranged to adapt to the particular device being in use.
Read full review
Cons
Absolute
  • I do not know where I would consider this product to be deficient in functionality, difficult to use or any major changes that needed to be addressed.
  • I wish the pricing of this product was a little lower, but I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information.
Read full review
AT&T Cybersecurity
  • Creating custom rules is a bit complicated
  • Reporting could be improved
  • Agent has caused conflicts with a couple of our other applications
Read full review
Usability
Absolute
No answers on this topic
AT&T Cybersecurity
AlienVault OSSIM is far easy to use and manage - provided you know what you're doing. As any SIEM application, there is some background knowledge required in order to take advantage of the product's functionalities, such as the log correlation and analysis. Other than that, the application is quite usable and robust.
Read full review
Support Rating
Absolute
No answers on this topic
AT&T Cybersecurity
Everything is done through MSSP and installation pro services. Once those hours are burned up, then you're on your own without a lot of help. Typically the pro services hours aren't enough to get past 60 days and MSSP are hit and miss. We had a miss for installation helpers.
Read full review
Alternatives Considered
Absolute
I have only used Absolute Data and Device Security (DDS). It was recommended by my Dell sales rep. After reviewing the product info, and loading a demo, it became clear that this is what was needed to add to our existing security to protect us from information loss due to a data breach on our portable devices. I presented this solution to the appropriate departments, and they agreed that this was something well worth the investment.
Read full review
AT&T Cybersecurity
Originally my organization leveraged alien value due to the lower cost of entry and ability to manage it as a service provider. Unfortunately, after several years of working with this tool, it became unwieldy to use as it felt that almost every useful report had to be created by hand. As other tools have come out with the ability to do automated responses such as Stellar Data processor, we have begun to evaluate alternatives.
Read full review
Return on Investment
Absolute
  • Recovery of stolen assets.
  • After recovering a few devices and students becoming aware of Absolute being deployed, it had a prevention effect deterring additional theft.
  • It deterred pawn shops from accepting our stolen machines.
Read full review
AT&T Cybersecurity
  • It satisfied a requirement of our audit team (internal and external).
  • Custom written alerts allow us to be proactive for some events.
  • Stable product means we don't spend a lot of time keeping it up and running.
Read full review
ScreenShots

Absolute Visibility Screenshots

Screenshot of Endpoint Data Discovery SummaryScreenshot of Create Smart Device GroupsScreenshot of Software Overview ReportScreenshot of Create Policy GroupsScreenshot of Endpoint Data Discovery Match Score SummaryScreenshot of Endpoint Data Discovery Reporting Data