Likelihood to Recommend
If this is your first experience with a SIEM, this one can get you started. Take the time to learn the ins and outs of the product and you'll most likely be satisfied with it if your company is an SMB. If you need compliance reports, OSSIM is too small for you, you'll need to go with USM or USM Anywhere.
Read full review
As specified earlier, the product is very helpful to monitor the FTP, ODBC, JDBC, SQL and remote commands. What queries are coming to the system and who is issuing the commands so that we can analyze the and restrict their access if its not required. It helped us catch [a lot of] unauthorized users.
Read full review Pros Asset discovery. Once installed in a centric, network-accessible server, OSSIM can poll all your endpoints with common protocols (SSH, SNMP, WMI) to detect and discover site-wide assets to monitor. You only need to group them by your own criteria once added to the product. SIEM Event Correlation. You can define quite complex correlation rules to detect possible suspicious or malicious actions or attempts in your network, in order to categorize them as real threats or as false positives, thus streamlining your risk assessment and management. Ease of installation. The entire AlienVault OSSIM is self-contained in an ISO file, which can be burned into a DVD or just mounted in your server of choice (physical or virtual) for deployment. The installation process is automated and quote verbosed, with options for static IP, email messaging and others. Ease of access. Being AlienVault OSSIM a self-contained appliance, it can be accessed via web by any device that supports a web browser, being that desktops, workstation, mobile devices, etc. The OSSIM dashboard and other features are automatically rearranged to adapt to the particular device being in use. Read full review Restricted FTP users ODBC/JDBC connection restrictions Exit Point Security Performance, Flexibility Read full review Cons Creating custom rules is a bit complicated Reporting could be improved Agent has caused conflicts with a couple of our other applications Read full review Adding a user to the exit point manger and then specifying the same user to restrict for particular service is bit complex i feel, instead of that making only one entry to restriction would be good. All Features are good Can maintain all systems from central system. Read full review Usability
AlienVault OSSIM is far easy to use and manage - provided you know what you're doing. As any SIEM application, there is some background knowledge required in order to take advantage of the product's functionalities, such as the log correlation and analysis. Other than that, the application is quite usable and robust.
Read full review Support Rating
Everything is done through MSSP and installation pro services. Once those hours are burned up, then you're on your own without a lot of help. Typically the pro services hours aren't enough to get past 60 days and MSSP are hit and miss. We had a miss for installation helpers.
Read full review Alternatives Considered
Originally my organization leveraged alien value due to the lower cost of entry and ability to manage it as a service provider. Unfortunately, after several years of working with this tool, it became unwieldy to use as it felt that almost every useful report had to be created by hand. As other tools have come out with the ability to do automated responses such as
Data processor, we have begun to evaluate alternatives.
Read full review
Helpsystems was one of the best leading third-party service provider in the Market for
. Since we are already customer for the Helpsystems and their support is awesome. We need the best products in market and Helpsystems has all the good tools that suits to my environment. All we need is the best support when its required which Helpsystems support team doing at its best.
be identical or equivalent to
More (Definitions, Synonyms, Translation)
Read full review Return on Investment It satisfied a requirement of our audit team (internal and external). Custom written alerts allow us to be proactive for some events. Stable product means we don't spend a lot of time keeping it up and running. Read full review Controlling of unauthorized access Monitoring the exit point manger logs to restrict data access only to authorized people. Monitor of FTP, ODBC, SQL, Remote Commands and block attacks on IBM i DB2 Read full review ScreenShots