Archibus is an IWMS solution based on the IWMS capabilities of the former ARCHIBUS product line and the workspace planning and optimization solutions of the former Serraview, which merged with ARCHIBUS in December 2018.
N/A
Armis
Score 8.5 out of 10
N/A
Armis headquartered in Palo Alto offers an agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices, an out-of-band sensing technology to discover and analyze all managed, unmanaged, and IoT devices—from traditional devices like laptops and smartphones to new unmanaged smart devices like smart TVs, webcams, printers, HVAC systems, industrial robots, medical devices and more. Armis discovers devices on and off the network, continuously…
N/A
Splunk Enterprise Security
Score 8.3 out of 10
N/A
Splunk Enterprise Security is an analytics-driven SIEM that helps to combat threats with actionable intelligence and advanced analytics at scale.
Archibus is well suited for organizations requiring heavy reporting functions, and that have complex processes for managing moves and space chargebacks. It is less well suited for organizations that require input from multiple users (such as doing an employee seating survey).
We started an entirely new network segregation implementation for security policies. Armis was unparalleled at helping us find rogue static IP-assigned devices in our old network and helped us identify what they were so we could tackle the challenge of moving everything to the new network VLANs. Another use case is finding a specific device or a specific user account to track their activity. The layout is phenomenal, and the data is easy to understand and drill down into for further information. The new AVM (Asset Vulnerability Management) section is awesome to help us find the out-of-date devices or other risks on the network to figure out where we are most vulnerable and at risk. If you're looking for a way to have Armis auto patch vulnerabilities - that's only on the radar from what I've heard - but currently, it is an amazing tool for finding and detailing the CVEs and other risks. You can create policies to block specific risky behaviors, but currently, at the time of writing, there isn't any automated patching or remediation to known CVEs found on a device.
Based on my experience, Splunk is a strong git for some environments and a poor match for others. The distinction is primarily based on infrastructure complexity and budget. It's perfect for large enterprises with a mix of on-prem/cloud infrastructure. It's not a perfect match for small teams with restricted resources.
Writes Powerful Queries: The queries that can be written using the Splunk Query Language are very powerful and highly customizable to meet every need. Ex: Writing queries to search the intersection of two different sources like Network and Endpoint Logs.
Offers Dashboard Abilities: Helps build complex panels for Dashboards in addition to providing several out-of-the-box panels. Ex: creating panels to calculate the performance of analysts in a given timezone.
Helpful Search Aids: It helps to set up complex custom alerts very easily. The interesting fields section is very helpful while threat hunting. Ex: It shows all the users and the frequency of each in a failed login event. The user list on the interesting fields is useful to look for suspicious logins.
I've requested integration with Mosyle Manager for our Apple MDM products - it is on the radar but slow going - Mosyle has an API and a free 30-day trial, so implementation shouldn't be difficult - but honestly, other than that - Armis support has been astonishing, and there are so many integrations already - it's small potatoes.
Considering Armis has all the data collected and parsed - it would be nice to see a back-end system for those of us who are true nerds and want to really dig into the Syslog data and analyze packets directly - however, building some quick queries is probably easier if you know what you are looking for anyway - which is probably why this is a backward way of my own thinking and no fault of Armis at all. They make the interface so easy to use it's not necessary, but it hurts my inner geek.
Improved User Interface Customization: While the interface is generally intuitive, providing more options for users to customize their dashboards and views would enhance the overall user experience. Tailoring the interface to specific roles or use cases could be a valuable addition.
Simplified Alert Management: Streamlining the process of managing alerts, such as grouping or categorizing them based on severity or type, would make it easier for security teams to prioritize and respond to incidents effectively.
Expanded Threat Intelligence Feeds: Increasing the variety and sources of threat intelligence feeds available within ES would provide a broader context for identifying and mitigating emerging threats, ensuring a more comprehensive defense against evolving attack vectors.
User perspective it is simple through a web portal that shows all spaces and buildings. But as an administrator it was quite a bit of work to set up. And by extension updating is also a lot of work
Maintaining hundreds or even 1000+ SOC use cases is really difficult, considering that the Data sources may not always send the data. A module that detects data freshness issues and detect data format changes would be a great help. the main challenge today using Splunk Enterprise Security is making sure that the detection rules are still working properly given all the changes that occur in data source applications. Also, maintaining the data collects on tens of thousands of servers and more than 100k workstations is a real company IT challenge: the splunkbase forwarder may not support old OS anymore, while these are the most important to monitor. Moving to the Open Telemetry collector has become essential so that only 1 agent is required for both SIEM and application observability.
It takes a long time for items to load if you are just generally searching through logs. It is best to use the data models which load faster but can be strange in terms of what is coming from which logs where. Yes, you can look it up, but this also requires familiarity with where things are and how to look them up.
It's good when it's responsive, but I've had times where I had to wait quite a while for a response. But these are typically the exceptions rather than the rule. When you do get a response it is always well-informed and appropriate. I would say they've been trending better over time with this.
I experienced only on-line training, but the trainers were very professional and competent. Maybe it could be more useful if they also have an experience in projects because sometimes they didn't have a real project experience to communicate to the students. Anyway, it was very interesting and I learned many thing that's very difficoult (or maybe impossible!) to have by myself, aven if I have more than 10 years of Splunk activity experience.
It was very interesting and I learned many thing that's very difficoult (or maybe impossible!) to have by myself. The only problem was that, when I worked with the Splunk Professional Services, I found some difference between the training contents and the information from PS. In addition is required a long experience on Splunk Enterprise for the data ingestion part, in other words I'm able to work with ES because I'm worling on Splunk since 11 years, otherwise I'd some problem.
Archibus compares well with other IWMS software when it comes to integrating with BIM models and reporting capabilities. I selected Archibus as it has all the tools and processes needed to manage space and moves, with the intention to expand to other modules like Lease Administration and Asset Management. The constant upgrades to Archibus also helps to keep the software up-to-date with other third party products such as Revit.
Armis is kind of a total conglomeration of a ton of different tools/systems, and depending on how you want to set it up can do almost anything a lot of these other tools can do - and in some cases, even better. It doesn't do software deployment or other things like SCCM I have listed, but the reporting side is so much better than SCCM's interface. As far as data breaches, user/device activity tracking, vulnerability outlook, network scanning, device identification, and agentless miracles of magic - Armis is the king.
Splunk enterprise is the only solution that we’ve been able to identify that provides risk based alerting, which allows our SOC to reduce analyst fatigue which would be a huge problem without it. Before RBA, there were thousands of alerts a day and it was impossible to review all of them
for my exterience, unit pricing and billing frequency are correct. As I already said, I hint to have more discount flexibility, expecially with new customers, because there are competitors less expensive and very aggressive that are dangerous. In addition the possibility to don't pay the license for the development period could be a very interesting feature for the final customers.
- 8 out of 10 and took 2 for the data pipeline and administration part. Even if you'd like to improve yourself or your team, you have to pay a lot of money and it could be more than GIAC education + cert. - Normalization for Data models and CPU-based searches can be a problem sometimes.
I had a fantastic experience with Splunk Professional Services: they worked with us in our last SON project (a SOC migration for a very large customer) and helped to build a multi tenent environment even if ES isn't a multi tenant platform. Th Splunk PS was a very professional and competent people, he is italian and was able to speak with our italian customers.
We have a 100% success rate on all our ES implementations due to the amazing documentation and Splunk enablement on the subject.
Our Splunk ES business has grown 100% YoY for the last 3 years.
In terms of long term management and maintenance, ES has been highly stable and predictable, reducing our overhead on costly services team for ad hoc maintenance work.