What users are saying about

AlienVault USM

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
334 Ratings
16 Ratings

AlienVault USM

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
334 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 7.9 out of 101
16 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 9 out of 101

Add comparison

Likelihood to Recommend

AlienVault USM

In my organization's scenario, the on-premise appliance provides great value as we are a small company with site inter-connectivity. Where I am not too sure of is how exactly the product scales with very large networks with separate Windows and network domains.
AJ Gumataotao profile photo

Lookout

Lookout is excellent for mobile device security. I'd recommend it to anyone looking for a simple solution to guarantee peace of mind when keeping mobile devices secure. It's also excellent for finding a device that's been lost remotely, including an excellent feature for enabling audio on a device when it was put in silent mode locally. The web UI is easy to use and allows for powerful functionality through a simple interface. Lastly, it is an excellent secondary backup solution. I'd recommend having other potential backup solutions as well in case this premium feature ever expires and you aren't sure whether you have a most recent contact backup within Lookout.
Nick Jastrebski profile photo

Feature Rating Comparison

Security Information and Event Management (SIEM)

AlienVault USM
7.3
Lookout
Centralized event and log data collection
AlienVault USM
8.0
Lookout
Correlation
AlienVault USM
8.0
Lookout
Event and log normalization
AlienVault USM
8.0
Lookout
Deployment flexibility
AlienVault USM
7.0
Lookout
Custom dashboards and views
AlienVault USM
6.0
Lookout
Host and network-based intrusion detection
AlienVault USM
7.0
Lookout

Pros

  • The SIEM does a good job of correlating network data from multiple sources along with the Data from deployed HIDS
  • The Nmap scan is fast and non-invasive that defines devices on your network.
  • The vulnerability scanning has several options and reports to enable data to be available for compliance purposes.
Clark Crain profile photo
  • Scanning of all device apps with up to date definitions.
  • Backing up all device related data to the cloud.
  • Finding devices.
Nick Jastrebski profile photo

Cons

  • Because AlienVault USM combines several well know components, you have to life with the fact, that they are not in their latest version, i.e. the integrated OSSEC, which should be replaced with the OSSEC-Wazuh fork instead.
  • Due to the all-in-one approach, the solution is quite resource hungry. You have to have a decent machine to run it.
  • The reporting module is nice, but sometimes it is quite a challenge to configure a custom report as you will only get the results you want after a trial and error run.
Christian B. Caldarone profile photo
  • Letting users know when device backups stop after premium services/payment expire.
Nick Jastrebski profile photo

Likelihood to Renew

AlienVault USM9.0
Based on 13 answers
It is a very well built software and solution for meeting our cybersecurity needs. The staff is always very well responsive with any issues that we have and it is perfect for satisfying FINRA's cybersecurity regulations.
Mikhail Suleymanov profile photo
No score
No answers yet
No answers on this topic

Usability

AlienVault USM7.2
Based on 33 answers
Almost all functions are intuitive, custom logging is not very easy to configure.
Dana Hancock profile photo
Lookout10.0
Based on 1 answer
I have never had any issue using the application since the UI and settings are laid out in an easy to follow way.
Bart Martinez profile photo

Support

AlienVault USM7.6
Based on 24 answers
Only had to use this once, and they had us back on track in an hour or so. They followed up the day after to make sure all was still working, great team.
Jason Cresswell profile photo
No score
No answers yet
No answers on this topic

Implementation

AlienVault USM7.1
Based on 37 answers
It required us to make a lot of changes and use a decent amount of manpower in order to implement the software.
Mikhail Suleymanov profile photo
No score
No answers yet
No answers on this topic

Alternatives Considered

I looked into Splunk, QRadar, but they were way too expensive and the reviews weren't always great. I used McAfee ESM extensively at my prior job and the product is probably the worst in the SIEM space. We moved to AlienVault from ELK which, while a cool product, didn't do any security event correlation and has a terrible search and log review and export. AlienVault is the only major SIEM comprised of over 200 open source tools I'd want to use anyway, so it does more than any SIEM with its HIDS agents, vulnerability scanning, asset discovery, etc. The included Open Threat Exchange subscription is also a major plus.
Jon Armani profile photo
Lookout was chosen by T-Mobile, Sprint, and AT&T which many employees have chosen as their mobile network provider. From that standpoint, it made it a simple decision. Its cloud based technology gives insight across almost all mobile code in the world. Lookout identifies connections that would otherwise go unseen without deep investigation. It helps prevent cybercriminals from sneaking into mobile devices and that's the key component for any mobile security solution. MobileIron and other competitor solutions have a similar offering, but based on network provider support I haven't need to look into the competition extensively.
Nick Jastrebski profile photo

Return on Investment

No answers on this topic
  • Lookout has minimized lost devices, by essentially enabling all users to find their device no matter where it may be lost. Almost all devices are recoverable with Lookout installed and an ability to get to the current location of the device. This prevents excessive replacement device costs.
  • If a device cannot be physically recovered all personal data on the device can be wiped remotely. This reduces data breach risk for a lost/stolen device.
Nick Jastrebski profile photo

Screenshots

Lookout

Pricing Details

AlienVault USM

General
Free Trial
Yes
Free/Freemium Version
Yes
Premium Consulting/Integration Services
Yes
Entry-level set up fee?
Optional
Additional Pricing Details

AlienVault USM More Information

Lookout

General
Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No
Additional Pricing Details

Lookout More Information