Elastic Security vs. Google Security Operations

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Elastic Security
Score 9.9 out of 10
N/A
Elastic Security equips analysts to prevent, detect, and respond to threats. The free and open solution delivers SIEM, endpoint security, threat hunting, and cloud monitoring. The solution encompasses Elastic SIEM, which brings Elasticsearch to SIEM and threat hunting. The Elastic Agent (or Elastic Endpoint Security based on the former Endgame security product acquired by Elastic in late 2019) brings signatureless malware prevention to endpoints, as well as security data collection for…N/A
Google Security Operations
Score 8.0 out of 10
N/A
Chronicle is a cloud-native SecOps platform used to proactively uncover the latest threats in near real-time, and enable security teams to detect, investigate and respond with speed and precision. It is based on the former Siemplify.N/A
Pricing
Elastic SecurityGoogle Security Operations
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Elastic SecurityGoogle Security Operations
Free Trial
NoYes
Free/Freemium Version
NoYes
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Elastic SecurityGoogle Security Operations
Best Alternatives
Elastic SecurityGoogle Security Operations
Small Businesses
LevelBlue USM Anywhere
LevelBlue USM Anywhere
Score 7.5 out of 10

No answers on this topic

Medium-sized Companies
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Splunk SOAR
Splunk SOAR
Score 8.3 out of 10
Enterprises
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Palo Alto Networks Cortex XSOAR
Palo Alto Networks Cortex XSOAR
Score 1.5 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Elastic SecurityGoogle Security Operations
Likelihood to Recommend
9.0
(1 ratings)
7.5
(2 ratings)
Support Rating
7.0
(1 ratings)
-
(0 ratings)
User Testimonials
Elastic SecurityGoogle Security Operations
Likelihood to Recommend
Elastic
I believe Endgame is well suited to organizations that have their own Cybersecurity department. Its not well suited for organizations that don't have a Cybersecurity department.
Read full review
Google
If you have lots of log sources across different solutions. Then UDM co-relation is a game changer and well suited for you. IF you close and document all the incident report in SIEM then it's not good for you.
Read full review
Pros
Elastic
  • Identify 0-day malware.
  • Provides a few forensic details on endpoints.
  • Very easy to administer.
Read full review
Google
  • automation of repetitive processes
  • customized playbooks.
  • The alert triage quality.
Read full review
Cons
Elastic
  • I would love that it provided more memory analysis details.
  • Being able to edit sensor profiles after creating them.
  • I would love it if it provided more automation features.
Read full review
Google
  • Connector improvement
  • UX experience
  • Reporting
Read full review
Usability
Elastic
No answers on this topic
Google
Google Security Operation is quite good replacement of the old product. We really like it, it new product and doesn't have much soar capabilities like other solution like it doesn't provide a market place to just install new plugins. Overall it's a great replacement than the other SIEM.
Read full review
Support Rating
Elastic
Even though their support is good, I think there are some areas where they need to provide more thorough solutions to issues, some of their solutions are pretty basic and have already been tried.
Read full review
Google
No answers on this topic
Alternatives Considered
Elastic
Endgame is based on the MITRE framework which has proven to be a successful framework to identify various attack patterns that attackers use. Also, compared to the others it's easier to administer and manage.
Read full review
Google
Read full review
Return on Investment
Elastic
  • Being able to identify threats we couldn't identify before.
  • Easier management of endpoints.
  • Being able to immediately isolate endpoints remotely that have high severity threats.
Read full review
Google
  • automates repetitive tasks increasing output
  • has reduced unnecessary workload on our analysts.
  • Its high security intelligence has minimized time for remediation o security breaches.
Read full review
ScreenShots

Google Security Operations Screenshots

Screenshot of MarketplaceScreenshot of Case ManagementScreenshot of Interactive InvestigationScreenshot of Incident ManagementScreenshot of Incident Response PlaybooksScreenshot of Interactive Dashboards