Elastic Security vs. Forcepoint Insider Threat

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Elastic Security
Score 8.8 out of 10
N/A
Elastic Security equips analysts to prevent, detect, and respond to threats. The free and open solution delivers SIEM, endpoint security, threat hunting, and cloud monitoring. The solution encompasses Elastic SIEM, which brings Elasticsearch to SIEM and threat hunting. The Elastic Agent (or Elastic Endpoint Security based on the former Endgame security product acquired by Elastic in late 2019) brings signatureless malware prevention to endpoints, as well as security data collection for…N/A
Forcepoint Insider Threat
Score 8.8 out of 10
N/A
Forcepoint Insider Threat is a security analytics tool for, searching, detecting and mitigating malicious or policy-violating employee behavior.N/A
Pricing
Elastic SecurityForcepoint Insider Threat
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Elastic SecurityForcepoint Insider Threat
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Community Pulse
Elastic SecurityForcepoint Insider Threat
Top Pros
Top Cons
Best Alternatives
Elastic SecurityForcepoint Insider Threat
Small Businesses
AlienVault USM
AlienVault USM
Score 8.0 out of 10

No answers on this topic

Medium-sized Companies
Splunk Enterprise
Splunk Enterprise
Score 8.4 out of 10
Forcepoint DLP
Forcepoint DLP
Score 8.8 out of 10
Enterprises
Microsoft Sentinel
Microsoft Sentinel
Score 8.4 out of 10
Forcepoint DLP
Forcepoint DLP
Score 8.8 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Elastic SecurityForcepoint Insider Threat
Likelihood to Recommend
9.0
(1 ratings)
8.6
(2 ratings)
Support Rating
7.0
(1 ratings)
-
(0 ratings)
User Testimonials
Elastic SecurityForcepoint Insider Threat
Likelihood to Recommend
Elastic
I believe Endgame is well suited to organizations that have their own Cybersecurity department. Its not well suited for organizations that don't have a Cybersecurity department.
Read full review
Forcepoint
Email protection, you can see and restrict every kind of email having confidential data for which it provides a catalog building with data classification. Each and every department need to classify its data to see better results through Forcepoint. Because all it [needs] a deep down analysis of each and every information shared through email and other means of sharing.
Read full review
Pros
Elastic
  • Identify 0-day malware.
  • Provides a few forensic details on endpoints.
  • Very easy to administer.
Read full review
Forcepoint
  • Establishment of normal user behavior and early indication of a potential risk when a user starts to stray from normal activity.
  • Automatically identify the riskiest user.
  • Provides context as a prove to investigation.
Read full review
Cons
Elastic
  • I would love that it provided more memory analysis details.
  • Being able to edit sensor profiles after creating them.
  • I would love it if it provided more automation features.
Read full review
Forcepoint
  • Visualization of data
  • Options are hard to find
  • Integration with Active directory
Read full review
Support Rating
Elastic
Even though their support is good, I think there are some areas where they need to provide more thorough solutions to issues, some of their solutions are pretty basic and have already been tried.
Read full review
Forcepoint
No answers on this topic
Alternatives Considered
Elastic
Endgame is based on the MITRE framework which has proven to be a successful framework to identify various attack patterns that attackers use. Also, compared to the others it's easier to administer and manage.
Read full review
Forcepoint
Powerful tool with smart data collection that helps us to automatically detect when a user strays into abnormal behavior and the integration with Forcepoint DLP which has helped us to quickly drive to smarter decision after detecting risky user behavior and the video collection and playbacks helps a lot during investigation.
Read full review
Return on Investment
Elastic
  • Being able to identify threats we couldn't identify before.
  • Easier management of endpoints.
  • Being able to immediately isolate endpoints remotely that have high severity threats.
Read full review
Forcepoint
  • Licenses are bundle up.
  • User based licensing.
  • Renewal cost is almost same as purchasing cost.
Read full review
ScreenShots