Anomali ThreatStream vs. Google Security Operations

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Anomali ThreatStream
Score 6.4 out of 10
N/A
A solution to operationalize actionable data and insights to secure any organization. Anomali ThreatStream provides curated access to the a global repository of threat intelligence, delivering enrichment, contextualization, and detection of known and emerging threats.N/A
Google Security Operations
Score 8.4 out of 10
N/A
Chronicle is a cloud-native SecOps platform used to proactively uncover the latest threats in near real-time, and enable security teams to detect, investigate and respond with speed and precision. It is based on the former Siemplify.N/A
Pricing
Anomali ThreatStreamGoogle Security Operations
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Anomali ThreatStreamGoogle Security Operations
Free Trial
NoYes
Free/Freemium Version
NoYes
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Anomali ThreatStreamGoogle Security Operations
Best Alternatives
Anomali ThreatStreamGoogle Security Operations
Small Businesses
OpenText Core Endpoint Protection
OpenText Core Endpoint Protection
Score 7.9 out of 10

No answers on this topic

Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Splunk SOAR
Splunk SOAR
Score 8.4 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Palo Alto Networks Cortex XSOAR
Palo Alto Networks Cortex XSOAR
Score 1.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Anomali ThreatStreamGoogle Security Operations
Likelihood to Recommend
8.9
(2 ratings)
7.5
(2 ratings)
User Testimonials
Anomali ThreatStreamGoogle Security Operations
Likelihood to Recommend
Anomali
Anomali ThreatStream is excellent in scenarios where we deliver Managed Security Services to customers. It offers exhaustive volumes of information in the form of threat bulletins, IOCs, Threat Actor profiling, and details related to campaigns in the wild which can be used to a great extent by MSSPs. For an enterprise SOC, I believe it is a little less suited purely because of the pricing aspect as it is slightly towards the expensive side of the spectrum.
Read full review
Google
If you have lots of log sources across different solutions. Then UDM co-relation is a game changer and well suited for you. IF you close and document all the incident report in SIEM then it's not good for you.
Read full review
Pros
Anomali
  • Indicators of Compromise
  • Signatures
  • Community Sharing
Read full review
Google
  • automation of repetitive processes
  • customized playbooks.
  • The alert triage quality.
Read full review
Cons
Anomali
  • The user interface, perhaps there is some room for improvement although it is good already.
  • Confidence assigning process for IOCs needs to be more robust and transparent.
  • While integration with SIEM solutions is a cakewalk, there is definitely added value if SIGMA rule conversion and YARA rule creation are provided from the platform.
Read full review
Google
  • Connector improvement
  • UX experience
  • Reporting
Read full review
Usability
Anomali
No answers on this topic
Google
Google Security Operation is quite good replacement of the old product. We really like it, it new product and doesn't have much soar capabilities like other solution like it doesn't provide a market place to just install new plugins. Overall it's a great replacement than the other SIEM.
Read full review
Alternatives Considered
Anomali
Many of the products that can be used to be ingested into a security event management software can be cumbersome with threat streamThere are many opportunities to continue fine-tuning the environment and providing great context in regards to threat research. When compared to other products threat stream stands out from usability and features.
Read full review
Google
Read full review
Return on Investment
Anomali
  • We have seen a positive ROI as the security monitoring is taken to the next level when it is augmented with threat intel data that Anomali provides.
  • Our customers are very satisfied with the periodic threat reports that we send, which are created using Anomali ThreatStream.
  • The overall business objectives are met as Threat Intel is one of the most important pillars when it comes to providing security services, and we use Anomali ThreatStream extensively for that.
Read full review
Google
  • automates repetitive tasks increasing output
  • has reduced unnecessary workload on our analysts.
  • Its high security intelligence has minimized time for remediation o security breaches.
Read full review
ScreenShots

Google Security Operations Screenshots

Screenshot of MarketplaceScreenshot of Case ManagementScreenshot of Interactive InvestigationScreenshot of Incident ManagementScreenshot of Incident Response PlaybooksScreenshot of Interactive Dashboards