What users are saying about
<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
Top Rated
458 Ratings
17 Ratings

AlienVault USM

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
Top Rated
458 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 8.1 out of 101
17 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 9 out of 101

Likelihood to Recommend

AlienVault USM

AlienVault USM Anywhere is a great SIEM and if you need to deploy a SaaS solution then it is suited very well. It works very well for us being 100% AWS and integrates well with our toolset and AWS features. The AT&T Alien Labs Open Threat Intelligence (OTX) is perfect for providing context on events and feeding our incident response processes.
Matthew White profile photo

Lookout

  • It is ideal for when the phone has been lost or stolen because it detects the immediate location of the phone.
  • Although it is capable of scanning at high speed, it tends to consume the battery very fast, so it has to be a big problem.
  • It is software that can have a personal or business level, and in both cases, security is maintained through its function as an antivirus.
  • If you want to make a copy of the security of personal or business information as files, this is ideal for it, as it works as a backup.
Michelli Capecchi profile photo

Feature Rating Comparison

Security Information and Event Management (SIEM)

AlienVault USM
7.3
Lookout
Centralized event and log data collection
AlienVault USM
8.0
Lookout
Correlation
AlienVault USM
8.0
Lookout
Event and log normalization
AlienVault USM
8.0
Lookout
Deployment flexibility
AlienVault USM
7.0
Lookout
Custom dashboards and views
AlienVault USM
6.0
Lookout
Host and network-based intrusion detection
AlienVault USM
7.0
Lookout

Pros

AlienVault USM

  • AlienVault USM is based on well-known Open Source components, which each for itself, represents a quasi industry standard
  • Integration into the existing infrastructure works like a charm. Basically you just need to roll-out an OSSEC client to each server or PC and you have already a pretty high coverage of security information and events. They immediately show up in the AlienVault Webinterface
  • Due to the countless plugins, it is very easy to add network devices like firewalls, router, switches, but also servers running apache and the alike. You will just need to forward syslog and it will all appear in your AlienVault Webinterface
  • The modular design of AlienVault USM in form of "deployable sensors", allows you to easily integrate different network segments, such as remote sites.
  • As regular vulnerability scans are a must to understand which CVEs your infrastructure is exposed at, this becomes an easy task with AlienVault. They provide you with a set-and-forget approach for running regular scans. Additionally there are helpful hints to how to get more secure.
Christian B. Caldarone profile photo

Lookout

  • A key strength is their proactive cybersecurity posture. That's not nearly as common as it should be, especially with the level of awareness of the scope of the problem these days.
  • Another key strength is their global network. That level of visibility makes all the difference, in today's cyber wars where, and you can quote me: "When an Advanced Persistent Threat (APT) attack is just a matter of time, when even zero day detection is too late, radically different approaches are required if we are ever to win these cyberwars." That's exactly what Lookout has done, and continues to do.
  • One of the greatest cyber risks in mobile is what every one uses - apps! Apps from Starbucks to Nordstroms to banking to the myriad of productivity tools we all use everyday to exceed our business/productivity goals. Now with the ability of threat actors to trojanized apps, those Lookout scans that don't require you to do any upgrades, and their proactive cybersecurity posture are business critical for everyone.
Jackie Bassett profile photo

Cons

AlienVault USM

  • Because AlienVault USM combines several well know components, you have to life with the fact, that they are not in their latest version, i.e. the integrated OSSEC, which should be replaced with the OSSEC-Wazuh fork instead.
  • Due to the all-in-one approach, the solution is quite resource hungry. You have to have a decent machine to run it.
  • The reporting module is nice, but sometimes it is quite a challenge to configure a custom report as you will only get the results you want after a trial and error run.
Christian B. Caldarone profile photo

Lookout

  • They're the global, mobile cyber experts we trust. They're ahead of the curve already. All I could suggest is, keep going in that direction.
  • Perhaps, send out an occasional , brief update on global trends that business executives should be aware of, even when Lookout is already on it.
  • Keep it brief, with a case study where a proactive action was taken and an event was avoided. Those would be shared enterprise-wide.
  • More PR about your proactive actions would be educational for us all. NO FUD, will ever work, but seeing that there are actions we can take, even to the newest of threats will be very effective.
Jackie Bassett profile photo

Likelihood to Renew

AlienVault USM

AlienVault USM 9.1
Based on 13 answers
It is a great product and has been instrumental to our security posture.
Dana Hancock profile photo

Lookout

No score
No answers yet
No answers on this topic

Usability

AlienVault USM

AlienVault USM 7.4
Based on 34 answers
Almost all functions are intuitive, custom logging is not very easy to configure.
Dana Hancock profile photo

Lookout

Lookout 10.0
Based on 1 answer
I have never had any issue using the application since the UI and settings are laid out in an easy to follow way.
Bart Martinez profile photo

Support

AlienVault USM

AlienVault USM 7.6
Based on 24 answers
I have contacted support many times and every time they addressed the issue and continued until it was resolved. The product is solid, so the overall operation is trouble free.
Dana Hancock profile photo

Lookout

No score
No answers yet
No answers on this topic

Implementation

AlienVault USM

AlienVault USM 7.0
Based on 37 answers
Anything beyond a vanilla deployment will take a lot of effort.
Aaron Rothstein profile photo

Lookout

No score
No answers yet
No answers on this topic

Alternatives Considered

AlienVault USM

If you look at AlienVault USM, you will have to look at OSSIM too. For very small enterprises with limited budget or no budget at all, OSSIM might be a good alternative, it is the free version of AlienVault USM, but that means you are on your own with it. Another competitor is definitively GrayLog as it provides a very good interface and is easy to use, plus it is using ElasticSearch as its data store. As stated previously, the ELK stack (ElasticSearch Logstash Kibana) is a good alternative too, but not ready to use off the shelf, nor an all-in-one solution. In fact, the components used by AlienVault, such as OpenVAS, OSSEC, Suricata, etc are its biggest competitors at the same time, but only if you make the effort to run each of the as an independent solution. In return you get a maximum of flexibility and full power over your solution.
Christian B. Caldarone profile photo

Lookout

They were all good in their day, but then they evolved into "we do everything" mode. We prefer the technical horsepower of purpose-built solutions where the problem is compelling, which mobile/app cybersecurity is. Otherwise, discovery of a source issue, cost and complexity that comes inherently in "we do everything" offerings is exponentially less effective.
Jackie Bassett profile photo

Return on Investment

AlienVault USM

No answers on this topic

Lookout

  • It's always difficult, in cyber, to put an ROI on a "non-event". As they say, the best that can happen to a CISO's day, is that no breach happened.
  • Lookout's auto scan and auto-reporting that every app has been scanned, the number of apps and what has/has not been found gives a level of comfort, and embeds a level of alertness everyday, never to be taken for granted.
  • There has been no negative impact. I open those scans every time, in anticipation of good news but realizing there well could be news of another kind. What I am as confident as possible about, is that, if there were an issue, Lookout would have been there to see it, and take the appropriate actions.
  • In the earlier days of cybersecurity, one would have had to hire an entire team of cyber experts or outsource it to a managed cybersecurity company at a cost that might have prohibited business. Lookout has made is easier for us all to stay compliant, aware and grow.
Jackie Bassett profile photo

Screenshots

Lookout

Pricing Details

AlienVault USM

General

Free Trial
Yes
Free/Freemium Version
Yes
Premium Consulting/Integration Services
Yes
Entry-level set up fee?
Optional
Additional Pricing Details

Lookout

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No
Additional Pricing Details

Add comparison