Overview
ProductRatingMost Used ByProduct SummaryStarting Price
AWS CloudTrail
Score 8.8 out of 10
N/A
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of an AWS account. With CloudTrail, users can log, continuously monitor, and retain account activity related to actions across AWS infrastructure. CloudTrail provides event history of AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking,…N/A
Cisco TrustSec
Score 7.2 out of 10
N/A
N/AN/A
Google Security Operations
Score 8.0 out of 10
N/A
Chronicle is a cloud-native SecOps platform used to proactively uncover the latest threats in near real-time, and enable security teams to detect, investigate and respond with speed and precision. It is based on the former Siemplify.N/A
Pricing
AWS CloudTrailCisco TrustSecGoogle Security Operations
Editions & Modules
No answers on this topic
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
AWS CloudTrailCisco TrustSecGoogle Security Operations
Free Trial
YesNoYes
Free/Freemium Version
YesNoYes
Premium Consulting/Integration Services
YesNoNo
Entry-level Setup FeeNo setup feeNo setup feeNo setup fee
Additional DetailsYou can view, filter, and download the most recent 90 days of your account activity for all management events in supported AWS services free of charge. You can set up a trail that delivers a single copy of management events in each region free of charge. Once a CloudTrail trail is set up, Amazon S3 charges apply based on your usage. You will be charged for any data events or additional copies of management events recorded in that region. In addition, you can choose CloudTrail Insights by enabling Insights events in your trails. CloudTrail Insights analyzes write management events, and you are charged based on the number of events that are analyzed in that region.
More Pricing Information
Community Pulse
AWS CloudTrailCisco TrustSecGoogle Security Operations
Best Alternatives
AWS CloudTrailCisco TrustSecGoogle Security Operations
Small Businesses
Armor
Armor
Score 6.0 out of 10
Armor
Armor
Score 6.0 out of 10

No answers on this topic

Medium-sized Companies
Druva Security Cloud
Druva Security Cloud
Score 9.4 out of 10
Druva Security Cloud
Druva Security Cloud
Score 9.4 out of 10
Splunk SOAR
Splunk SOAR
Score 8.4 out of 10
Enterprises
Druva Security Cloud
Druva Security Cloud
Score 9.4 out of 10
Druva Security Cloud
Druva Security Cloud
Score 9.4 out of 10
Palo Alto Networks Cortex XSOAR
Palo Alto Networks Cortex XSOAR
Score 1.3 out of 10
All AlternativesView all alternativesView all alternativesView all alternatives
User Ratings
AWS CloudTrailCisco TrustSecGoogle Security Operations
Likelihood to Recommend
8.0
(4 ratings)
9.0
(1 ratings)
7.5
(2 ratings)
User Testimonials
AWS CloudTrailCisco TrustSecGoogle Security Operations
Likelihood to Recommend
Amazon AWS
It is necessary to enable [AWS] Cloudtrail when using AWS in a production environment, otherwise you will not have any idea what is happening within your accounts. Third party monitoring applications will all require [AWS] CloudTrail to be enabled as well. I would not recommend it solely as a monitoring tool, to get the most out of it you must send the logs elsewhere. Either to Cloudwatch logs or a third party product.
Read full review
Cisco
  • Control access to critical enterprise resources by business role, device type, and location, so policy changes can be made without redesigning the network.
  • Easily manage access control and segmentation while maintaining compliance.
  • Create and manage policies in an easy-to-use matrix.
  • Reduce the need for costly network re-architecture by automating firewall rules and access control list (ACL) administration.
Read full review
Google
If you have lots of log sources across different solutions. Then UDM co-relation is a game changer and well suited for you. IF you close and document all the incident report in SIEM then it's not good for you.
Read full review
Pros
Amazon AWS
  • API Log
  • User activity tracking
  • Real-time alerts
Read full review
Cisco
  • Reduce operational expenses by simplifying network segmentation and defining security groups based on business roles, not IP addresses.
  • Limit the impact of a data breach by quickly isolating and containing threats using technology already in your network.
Read full review
Google
  • automation of repetitive processes
  • customized playbooks.
  • The alert triage quality.
Read full review
Cons
Amazon AWS
  • [In my experience] Cost can easily get out of control with multiple trails on full logging
  • Logs can be difficult to decipher
Read full review
Cisco
  • Help and solutions if needed, support
Read full review
Google
  • Connector improvement
  • UX experience
  • Reporting
Read full review
Usability
Amazon AWS
No answers on this topic
Cisco
No answers on this topic
Google
Google Security Operation is quite good replacement of the old product. We really like it, it new product and doesn't have much soar capabilities like other solution like it doesn't provide a market place to just install new plugins. Overall it's a great replacement than the other SIEM.
Read full review
Alternatives Considered
Amazon AWS
I think in the end, CloudTrail has more features and you can dive deeper inside the logs so it depends on your usage and what you expect in the end to make the right choice, I would say that both tools are really useful and bring a lot of benefits to I.T. companies.
Read full review
Cisco
No answers on this topic
Google
Read full review
Return on Investment
Amazon AWS
  • Allows us to investigate any strange api actions
  • Increases security
  • Audit trail of changes made in AWS
Read full review
Cisco
  • Reduction in IT operational costs
Read full review
Google
  • automates repetitive tasks increasing output
  • has reduced unnecessary workload on our analysts.
  • Its high security intelligence has minimized time for remediation o security breaches.
Read full review
ScreenShots

AWS CloudTrail Screenshots

Screenshot of CloudTrail Insights: Identify and respond to unusual operational activity
•Unexpected spikes in resource provisioning
•Bursts of IAM management actions
•Gaps in periodic maintenance activity
•Automatic analysis of API calls and usage patterns
•Alerts when unusual activity is detected

Google Security Operations Screenshots

Screenshot of MarketplaceScreenshot of Case ManagementScreenshot of Interactive InvestigationScreenshot of Incident ManagementScreenshot of Incident Response PlaybooksScreenshot of Interactive Dashboards