AlienVault OSSIM vs. GFI LanGuard

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
AlienVault OSSIM
Score 8.9 out of 10
N/A
OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset discovery Vulnerability assessment Intrusion detection Behavioral monitoring SIEM OSSIM provides the basis for AlienVault's proprietary Unified Security…N/A
GFI LanGuard
Score 8.0 out of 10
N/A
GFI LanGuard is software used to manage and maintain end-point protection across a network. It provides visibility into all the elements in the network, helping to assess where there may be potential vulnerabilities, and enables the administrator to patch them. It is a patch management and network auditing solution.N/A
Pricing
AlienVault OSSIMGFI LanGuard
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
AlienVault OSSIMGFI LanGuard
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Community Pulse
AlienVault OSSIMGFI LanGuard
Top Pros

No answers on this topic

Top Cons
Features
AlienVault OSSIMGFI LanGuard
Security Information and Event Management (SIEM)
Comparison of Security Information and Event Management (SIEM) features of Product A and Product B
AlienVault OSSIM
7.5
10 Ratings
3% below category average
GFI LanGuard
-
Ratings
Centralized event and log data collection9.49 Ratings00 Ratings
Correlation7.010 Ratings00 Ratings
Event and log normalization/management8.110 Ratings00 Ratings
Deployment flexibility8.210 Ratings00 Ratings
Integration with Identity and Access Management Tools9.36 Ratings00 Ratings
Custom dashboards and workspaces9.49 Ratings00 Ratings
Host and network-based intrusion detection9.29 Ratings00 Ratings
Data integration/API management5.32 Ratings00 Ratings
Behavioral analytics and baselining5.42 Ratings00 Ratings
Rules-based and algorithmic detection thresholds5.33 Ratings00 Ratings
Response orchestration and automation6.32 Ratings00 Ratings
Reporting and compliance management8.44 Ratings00 Ratings
Incident indexing/searching6.43 Ratings00 Ratings
Best Alternatives
AlienVault OSSIMGFI LanGuard
Small Businesses
AlienVault USM
AlienVault USM
Score 7.9 out of 10
NinjaOne
NinjaOne
Score 9.4 out of 10
Medium-sized Companies
InsightIDR
InsightIDR
Score 9.0 out of 10
NinjaOne
NinjaOne
Score 9.4 out of 10
Enterprises
InsightIDR
InsightIDR
Score 9.0 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.2 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
AlienVault OSSIMGFI LanGuard
Likelihood to Recommend
9.3
(10 ratings)
9.0
(1 ratings)
Usability
8.0
(1 ratings)
-
(0 ratings)
Support Rating
7.9
(3 ratings)
7.0
(1 ratings)
User Testimonials
AlienVault OSSIMGFI LanGuard
Likelihood to Recommend
AT&T Cybersecurity
If this is your first experience with a SIEM, this one can get you started. Take the time to learn the ins and outs of the product and you'll most likely be satisfied with it if your company is an SMB. If you need compliance reports, OSSIM is too small for you, you'll need to go with USM or USM Anywhere.
Read full review
GFI Software
-To track the vulnerability level of a windows network. -To push windows and other application updates from a central location. -Produce reports to highlight work being done to protect a network. In some organizations, you may have to prove for audit reasons you are enforcing policies put into place around cyber-security. This software can help you track work done on an ongoing basis for such purposes.
Read full review
Pros
AT&T Cybersecurity
  • Asset discovery. Once installed in a centric, network-accessible server, OSSIM can poll all your endpoints with common protocols (SSH, SNMP, WMI) to detect and discover site-wide assets to monitor. You only need to group them by your own criteria once added to the product.
  • SIEM Event Correlation. You can define quite complex correlation rules to detect possible suspicious or malicious actions or attempts in your network, in order to categorize them as real threats or as false positives, thus streamlining your risk assessment and management.
  • Ease of installation. The entire AlienVault OSSIM is self-contained in an ISO file, which can be burned into a DVD or just mounted in your server of choice (physical or virtual) for deployment. The installation process is automated and quote verbosed, with options for static IP, email messaging and others.
  • Ease of access. Being AlienVault OSSIM a self-contained appliance, it can be accessed via web by any device that supports a web browser, being that desktops, workstation, mobile devices, etc. The OSSIM dashboard and other features are automatically rearranged to adapt to the particular device being in use.
Read full review
GFI Software
  • Install an agent to thoroughly scan machines to discover vulnerabilities.
  • Keeps there lists up-to-date with applications outside of windows and lets you know when an update is available.
Read full review
Cons
AT&T Cybersecurity
  • Creating custom rules is a bit complicated
  • Reporting could be improved
  • Agent has caused conflicts with a couple of our other applications
Read full review
GFI Software
  • It could be a bit of information overload which some things are shown can become noise. Maybe different levels of "security" for lack of a better term may be better where you have a summary vs detailed level when it comes to rating the vulnerability of the entire network.
  • I find I sometimes have issues with PCs on a different network accessed across a VPN where timeouts often occur with very large updates. This aspect can be improved.
Read full review
Usability
AT&T Cybersecurity
AlienVault OSSIM is far easy to use and manage - provided you know what you're doing. As any SIEM application, there is some background knowledge required in order to take advantage of the product's functionalities, such as the log correlation and analysis. Other than that, the application is quite usable and robust.
Read full review
GFI Software
No answers on this topic
Support Rating
AT&T Cybersecurity
Everything is done through MSSP and installation pro services. Once those hours are burned up, then you're on your own without a lot of help. Typically the pro services hours aren't enough to get past 60 days and MSSP are hit and miss. We had a miss for installation helpers.
Read full review
GFI Software
I only tried to access there support once and it was a relatively pain-free process. They also have a lot of documentation available online which can be used to learn and tailor the software to suit your needs. It just takes time and effort to plan, execute and monitor going forward.
Read full review
Alternatives Considered
AT&T Cybersecurity
Originally my organization leveraged alien value due to the lower cost of entry and ability to manage it as a service provider. Unfortunately, after several years of working with this tool, it became unwieldy to use as it felt that almost every useful report had to be created by hand. As other tools have come out with the ability to do automated responses such as Stellar Data processor, we have begun to evaluate alternatives.
Read full review
GFI Software
WSUS was the other alternative I considered but I believe GFI takes updates, reporting, and functionality to a different level for an enterprise/medium-size business environment.
Read full review
Return on Investment
AT&T Cybersecurity
  • It satisfied a requirement of our audit team (internal and external).
  • Custom written alerts allow us to be proactive for some events.
  • Stable product means we don't spend a lot of time keeping it up and running.
Read full review
GFI Software
  • Certainty. It allows you to know where on your network needs attention.
  • Peace of mind. As security professionals, we can only put the necessary things in place to prevent malicious persons from exploiting a network. The software allows you to know whether or not your risk of exploitation is high or low. and if high what to do with it.
Read full review
ScreenShots