What users are saying about
<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
Top Rated
599 Ratings

AlienVault USM

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
Top Rated
599 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 7.9 out of 101
5 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 8.3 out of 101

Likelihood to Recommend

AlienVault USM

AlienVault Unified Security Management (USM) Anywhere is a cloud-based security information and event management solution that provides effective and affordable threat detection, incident response, and compliance management capabilities. USM Anywhere is well suited to mid-size enterprise environments operating in the cloud. USM Anywhere is also well suited to enterprises whose operations teams require easy deployment and management. Last, USM Anywhere is considered a highly affordable option compared to competitors. USM Anywhere lags competitors in several areas, such as application monitoring, database monitoring, and integrations with third-party solutions such as cloud access security brokers (CASB), DAM, DAP, and DLP.
Matthew Stacks profile photo

Cisco StealthWatch

I think a larger company that needs NetFlow data and has someone who can dedicate some time into learning the inner workings of StealthWatch could take advantage of all that StealWatch has to offer, but the suite itself may be too much to swallow for smaller staffed companies or companies that don't need this kind of visibility into network traffic.
No photo available

Feature Rating Comparison

Security Information and Event Management (SIEM)

AlienVault USM
7.3
Cisco StealthWatch
Centralized event and log data collection
AlienVault USM
8.0
Cisco StealthWatch
Correlation
AlienVault USM
8.0
Cisco StealthWatch
Event and log normalization
AlienVault USM
8.0
Cisco StealthWatch
Deployment flexibility
AlienVault USM
7.0
Cisco StealthWatch
Custom dashboards and views
AlienVault USM
6.0
Cisco StealthWatch
Host and network-based intrusion detection
AlienVault USM
7.0
Cisco StealthWatch

Pros

AlienVault USM

  • Alienvault USM is THOROUGH. We have a highly integrated workspace that's most SAAS, and I monitor those integrations and their security with AV. If I am trying to track the uptime of a laptop, I don't go to VPN or our Directory Services... I go to AV.
  • As I mentioned before, we use Sophos to protect our laptops. If a questionable file shows up on someones laptop, I hear about it from AlienVault before I hear about it from our Sophos service.
  • The OTX Pulse feature is a built-in feature that lets you subscribe to industries and you are notified about new threats that affect that industry on a daily basis. The pulse alerts are added to your AV watchlist.
Christian Holton profile photo

Cisco StealthWatch

  • Stellar at grabbing Netflow data - and really, really good at differentiating types of traffic.
  • Excellent at knowing which traffic was flowing from what endpoints - and then using some tie-ins to gather data about the endpoints.
  • Used this mostly for historic (what happened when) but also used it a few times for real-time analysis, looking for bandwidth hogs and help for troubleshooting issues.
  • Highly recommend as a forensic tool - doesn't do full packet capture, but for everything else it's awesome.
Matthew Frederickson profile photo

Cons

AlienVault USM

  • While there are many features, many of them are not very advanced. Vulnerability scanning as an example is extremely simplistic and almost unusable for an enterprise organization. It's just enough to get a program off the ground.
  • Cloud-only deployment model (SaaS) may not fit all organizations. Not all organizations are "cloud friendly".
  • Reporting capabilities out of the box are lack luster. Vulnerability management reporting as an example does not include a single canned report.
Frank DePaola profile photo

Cisco StealthWatch

  • The StealthWatch interface is clunky and broken into 2 parts, both an HTML console and a JAVA console. This causes issues as one is completely different than the other.
  • Licenses are eaten up very quickly and can be pricey.
  • Upgrading StealthWatch is more tedious and time consuming than it should be.
No photo available

Likelihood to Renew

AlienVault USM

AlienVault USM 4.4
Based on 16 answers
The centralized logging and retention for PCI compliance was our main driver, and it is meeting that need. Otherwise there has been enough frustration with the lack of documentation and the need to customize through the CLI that I would be open to alternatives.
Aaron Rothstein profile photo

Cisco StealthWatch

No score
No answers yet
No answers on this topic

Usability

AlienVault USM

AlienVault USM 7.3
Based on 35 answers
The product once properly configured seems to offer a wealth of information but has it's issues. I feel that the initial setup/ installation should include technical support to get up and running. My personal experience from the configuration as installed indicates that the network adaptors are not properly configured to read information. The network ports where configured to only ready 1/2 the network?? So having help to get the system up and running should be part of the initial purchase.
James Ellsworth profile photo

Cisco StealthWatch

No score
No answers yet
No answers on this topic

Support

AlienVault USM

AlienVault USM 7.5
Based on 25 answers
I have not had a single issue with the alienvault support staff. Any issue or question that we had, especially in the beginning during the installation phase the support staff was readily available via phone and email to help us. I am very happy with the decision we made to go with alienvault.
Mikhail Suleymanov profile photo

Cisco StealthWatch

No score
No answers yet
No answers on this topic

Online Training

AlienVault USM

AlienVault USM 8.6
Based on 6 answers
The instructor was very knowledgeable and was able to answer everyone's questions. He also was able to teach to many different levels. Some folks in the class had already been using USM or a similar product whereas I and a few others were brand new. He also provided a way of reaching out with questions after the training was over. Everyone in the training seemed to enjoy the class.
Christian Holton profile photo

Cisco StealthWatch

No score
No answers yet
No answers on this topic

Implementation

AlienVault USM

AlienVault USM 6.6
Based on 38 answers
Initial implementation was okay, but we should have gone on the one week course first as an understanding of the features and what to look for would have been of great use. This is especially relevant when fine tuning and correlating events and creating parsers.Once set up the system is pretty resilient and adding in configuration is quite an easy process. We only had on the odd few occasions had to progress any set up problems to tech support.There are also some great whitepapers and set up articles on AlienVault's website support.
Philip Clarke profile photo

Cisco StealthWatch

No score
No answers yet
No answers on this topic

Alternatives Considered

AlienVault USM

USM Appliance provides you with the ability to identify your critical assets and to set policies to alert you when those assets have vulnerabilities or are subjected to attacks. USM Appliance will generate alarms based upon the risk associated with any given security event captured in USM Appliance.USM Appliance provides you with the ability to identify your critical assets and to set policies to alert you when those assets have vulnerabilities or are subjected to attacks. USM Appliance will generate alarms based upon the risk associated with any given security event captured in USM Appliance. Identifying patterns of events that indicate a possible threat or vulnerability.
Mpho Lekota profile photo

Cisco StealthWatch

NTOP is the only thing out there, in my opinion, that provides similar type of visibility. But StealthWatch is the product all vendors should strive to emulate. It is easy to install; it is easy to configure; it works as advertised (and then some). I do recommend the three-day work shop they occasionally run - or some onsite training. The product is feature rich and the training will help you get the most out of it.
Matthew Frederickson profile photo

Return on Investment

AlienVault USM

No answers on this topic

Cisco StealthWatch

  • StealthWatch helps other departments make decisions quickly based on NetFlow data.
  • StealthWatch can bring a lot of reporting to the table that can be used to advance project necessities and prove data necessities to management.
No photo available

Screenshots

Cisco StealthWatch

Pricing Details

AlienVault USM

General

Free Trial
Yes
Free/Freemium Version
Yes
Premium Consulting/Integration Services
Yes
Entry-level set up fee?
Optional

Cisco StealthWatch

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

Rating Summary

Likelihood to Recommend

AlienVault USM
7.9
Cisco StealthWatch
7.5

Likelihood to Renew

AlienVault USM
4.4
Cisco StealthWatch

Usability

AlienVault USM
7.3
Cisco StealthWatch

Reliability and Availability

AlienVault USM
6.4
Cisco StealthWatch

Performance

AlienVault USM
7.3
Cisco StealthWatch

Support

AlienVault USM
7.5
Cisco StealthWatch

In-Person Training

AlienVault USM
4.5
Cisco StealthWatch

Online Training

AlienVault USM
8.6
Cisco StealthWatch

Implementation

AlienVault USM
6.6
Cisco StealthWatch

Scalability

AlienVault USM
6.3
Cisco StealthWatch

Add comparison