Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Elastic Security
Score 9.9 out of 10
N/A
Elastic Security equips analysts to prevent, detect, and respond to threats. The free and open solution delivers SIEM, endpoint security, threat hunting, and cloud monitoring. The solution encompasses Elastic SIEM, which brings Elasticsearch to SIEM and threat hunting. The Elastic Agent (or Elastic Endpoint Security based on the former Endgame security product acquired by Elastic in late 2019) brings signatureless malware prevention to endpoints, as well as security data collection for…N/A
Splunk Enterprise
Score 8.6 out of 10
N/A
Splunk is software for searching, monitoring, and analyzing machine-generated big data, via a web-style interface. It captures, indexes and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards and visualizations.N/A
Trellix Endpoint Security ENS
Score 8.2 out of 10
N/A
Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.N/A
Pricing
Elastic SecuritySplunk EnterpriseTrellix Endpoint Security ENS
Editions & Modules
No answers on this topic
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Elastic SecuritySplunk EnterpriseTrellix Endpoint Security ENS
Free Trial
NoYesNo
Free/Freemium Version
NoYesNo
Premium Consulting/Integration Services
NoNoNo
Entry-level Setup FeeNo setup feeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Elastic SecuritySplunk EnterpriseTrellix Endpoint Security ENS
Considered Multiple Products
Elastic Security

No answer on this topic

Splunk Enterprise
Chose Splunk Enterprise
Splunk is costly, but easier to maintain. Reliability is a key factor, and most products have issue. While Datadog is very costly, even to Splunk.
Trellix Endpoint Security ENS

No answer on this topic

Features
Elastic SecuritySplunk EnterpriseTrellix Endpoint Security ENS
Security Information and Event Management (SIEM)
Comparison of Security Information and Event Management (SIEM) features of Product A and Product B
Elastic Security
-
Ratings
Splunk Enterprise
8.1
85 Ratings
3% above category average
Trellix Endpoint Security ENS
-
Ratings
Centralized event and log data collection00 Ratings9.081 Ratings00 Ratings
Correlation00 Ratings8.383 Ratings00 Ratings
Event and log normalization/management00 Ratings8.482 Ratings00 Ratings
Deployment flexibility00 Ratings7.975 Ratings00 Ratings
Integration with Identity and Access Management Tools00 Ratings8.176 Ratings00 Ratings
Custom dashboards and workspaces00 Ratings8.682 Ratings00 Ratings
Host and network-based intrusion detection00 Ratings7.661 Ratings00 Ratings
Data integration/API management00 Ratings8.229 Ratings00 Ratings
Behavioral analytics and baselining00 Ratings7.527 Ratings00 Ratings
Rules-based and algorithmic detection thresholds00 Ratings7.728 Ratings00 Ratings
Response orchestration and automation00 Ratings7.324 Ratings00 Ratings
Reporting and compliance management00 Ratings8.529 Ratings00 Ratings
Incident indexing/searching00 Ratings8.632 Ratings00 Ratings
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Elastic Security
-
Ratings
Splunk Enterprise
-
Ratings
Trellix Endpoint Security ENS
8.3
15 Ratings
3% below category average
Anti-Exploit Technology00 Ratings00 Ratings8.013 Ratings
Endpoint Detection and Response (EDR)00 Ratings00 Ratings8.014 Ratings
Centralized Management00 Ratings00 Ratings9.015 Ratings
Hybrid Deployment Support00 Ratings00 Ratings7.98 Ratings
Infection Remediation00 Ratings00 Ratings8.014 Ratings
Vulnerability Management00 Ratings00 Ratings8.012 Ratings
Malware Detection00 Ratings00 Ratings9.015 Ratings
Best Alternatives
Elastic SecuritySplunk EnterpriseTrellix Endpoint Security ENS
Small Businesses
LevelBlue USM Anywhere
LevelBlue USM Anywhere
Score 7.7 out of 10
LevelBlue USM Anywhere
LevelBlue USM Anywhere
Score 7.7 out of 10
ThreatLocker
ThreatLocker
Score 9.3 out of 10
Medium-sized Companies
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 10.0 out of 10
All AlternativesView all alternativesView all alternativesView all alternatives
User Ratings
Elastic SecuritySplunk EnterpriseTrellix Endpoint Security ENS
Likelihood to Recommend
9.0
(1 ratings)
8.6
(86 ratings)
9.0
(26 ratings)
Likelihood to Renew
-
(0 ratings)
7.0
(18 ratings)
-
(0 ratings)
Usability
-
(0 ratings)
8.3
(19 ratings)
8.0
(1 ratings)
Availability
-
(0 ratings)
10.0
(1 ratings)
-
(0 ratings)
Support Rating
7.0
(1 ratings)
8.0
(18 ratings)
5.0
(6 ratings)
Online Training
-
(0 ratings)
8.0
(1 ratings)
-
(0 ratings)
Implementation Rating
-
(0 ratings)
7.0
(3 ratings)
-
(0 ratings)
Ease of integration
-
(0 ratings)
-
(0 ratings)
10.0
(1 ratings)
Product Scalability
-
(0 ratings)
9.1
(1 ratings)
-
(0 ratings)
User Testimonials
Elastic SecuritySplunk EnterpriseTrellix Endpoint Security ENS
Likelihood to Recommend
Elastic
I believe Endgame is well suited to organizations that have their own Cybersecurity department. Its not well suited for organizations that don't have a Cybersecurity department.
Read full review
Cisco
It's well suited for what I do, which is network security operations. And that's for anything from troubleshooting incidents, troubleshooting performance, troubleshooting for the purpose of a compliance and auditing. It's not best suited for users who are new in terms of they're new to the product and they have expectations that probably Splunk cannot meet.
Read full review
Trellix (Musarubra US LLC)
It provides great web security and will protect your devices against viruses and malware when paired with other security software and hardware. For instance, we have multiple layers of security set up so if McAfee misses something then one of our other barriers will catch the infection or intrusion before it reaches the network. I would not suggest using this product as a standalone agent because I do not think it will be as effective when working by itself. The dashboard also makes it convenient to manage devices, policies, and settings from wherever you are so it's an ideal solution for any IT department to use. I would just suggest using something else as a backup so your network isn't left vulnerable.
Read full review
Pros
Elastic
  • Identify 0-day malware.
  • Provides a few forensic details on endpoints.
  • Very easy to administer.
Read full review
Cisco
  • It is very useful in creating custom rules for analyzing system logs and display relevant information. The query language is very easy to learn.
  • We can create custom UI to visualize the output of our data. The interface is very flexible. It also allows the sharing of rules among users.
  • There is an open online community to help others. Stackoverflow also has a splunk community. These resources make it more convenient to learn.
Read full review
Trellix (Musarubra US LLC)
  • Provides high fidelity alerting.
  • Allows CSOC analysts to perform forensic triage and alert investigations through containment from a single pane of glass.
  • Provides alert telemetry across on-disk and in-memory attacks.
  • Supports many additional 'bolt-on' modules to provide additional alert context or capabilities.
Read full review
Cons
Elastic
  • I would love that it provided more memory analysis details.
  • Being able to edit sensor profiles after creating them.
  • I would love it if it provided more automation features.
Read full review
Cisco
  • Splunk light limits number of users to 5. Wish there was a flexible license, where one could add more users.
  • Splunk light does not let you add > few realtime alerts. Wish there was a flexible license, where one could add as many realtime alerts as wanted.
  • Better insight into daily ingestion values
Read full review
Trellix (Musarubra US LLC)
  • The amount of false detections especially the negative ones needed to be reduced.
  • It requires more optimization. It tends to make the PCs slower.
  • It almost doesn't have the ability to heal. This is very important as we need our sensitive data to be recoverable.
  • It doesn't have any free scanning functionality. Our users using personal machines cannot scan in case of an incident. This could be added like Malwarebytes.
Read full review
Likelihood to Renew
Elastic
No answers on this topic
Cisco
We are using Splunk extensively in our projects and we have recently upgraded to Splunk version 6.0 which is quite efficient and giving expected results. We keep track of updates and new features Splunk introduces periodically and try to introduce those features in our day to day activities for improvement in our reporting system and other tasks.
Read full review
Trellix (Musarubra US LLC)
No answers on this topic
Usability
Elastic
No answers on this topic
Cisco
You can literally throw in a single word into Splunk and it will pull back all instances of that word across all of your logs for the time span you select (provided you have permission to see that data). We have several users who have taken a few of the free courses from Splunk that are able to pull data out of it everyday with little help at all.
Read full review
Trellix (Musarubra US LLC)
So below is my breakdown, Pro's: Centralized Management, Comprehensive Protection and customization. Con's: Initial cost
Read full review
Reliability and Availability
Elastic
No answers on this topic
Cisco
When properly setup and configured, Splunk is extremely reliable.
Read full review
Trellix (Musarubra US LLC)
No answers on this topic
Support Rating
Elastic
Even though their support is good, I think there are some areas where they need to provide more thorough solutions to issues, some of their solutions are pretty basic and have already been tried.
Read full review
Cisco
Splunk maintains a well resourced support system that has been consistent since we purchased the product. They help out in a timely manner and provide expert level information as needed. We typically open cases online and communicate when possible via e-mail and are able to resolve most issues with that method.
Read full review
Trellix (Musarubra US LLC)
The support of product was very good when we initially implemented the solution. We were getting fats replies and could see the customer approach. After a while the level of support was not following the SLA's and the replies were getting very confusing and late.
Read full review
Online Training
Elastic
No answers on this topic
Cisco
The online course was simple clear and described the main capabilities of the solution. There is also an initial module that can be done for free so anyone can familiarize themselves with the functionality of this solution. On the other hand, however, there could be more free online courses. Maybe even with a certificate, this would broaden the group of people who are familiar with the platform while increasing familiarity with the solution itself.
Read full review
Trellix (Musarubra US LLC)
No answers on this topic
Implementation Rating
Elastic
No answers on this topic
Cisco
Smooth without too many major issues.
Read full review
Trellix (Musarubra US LLC)
No answers on this topic
Alternatives Considered
Elastic
Endgame is based on the MITRE framework which has proven to be a successful framework to identify various attack patterns that attackers use. Also, compared to the others it's easier to administer and manage.
Read full review
Cisco
I didn't get to fully evaluate Logstash as our corporation was already using Logstash, but both seemed like viable solutions to the problem that we were having. I wanted to evaluate Logstash some more, both did seem like they would work for the business needs that we had, we went with splunk as many teams were already using it.
Read full review
Trellix (Musarubra US LLC)
Unlike Trellix Endpoint Security Symantec Endpoint provides less information about events on the user side. Trellix give an opportunity to see information about virus detection on a user machine as quick as it possible, so we were able to catch the signs of virus propagation early and prevent the spread of damage
Read full review
Scalability
Elastic
No answers on this topic
Cisco
Splunk can scale in to the petabyte per day range which of course is awesome
Read full review
Trellix (Musarubra US LLC)
No answers on this topic
Return on Investment
Elastic
  • Being able to identify threats we couldn't identify before.
  • Easier management of endpoints.
  • Being able to immediately isolate endpoints remotely that have high severity threats.
Read full review
Cisco
  • I don't have any numbers to share but Splunk has positively served as a 24/7 monitoring tool that has saved hours of work by self-detecting, saving statistics and alerting problems in the system or from external interfaces as soon as they happen.
  • Splunk dashboards does a solid job in collecting, analyzing data and creating reports that contain an entire day's activity and then automatically sent out to the business.
  • Splunk is very easy to learn and very useful to any program or business application.
Read full review
Trellix (Musarubra US LLC)
  • From an auditing standpoint, we can show that our workstations/servers are protected.
  • Even though it cant identify more advanced/targeted malware, it is still good to identify the more obvious malware which occurs daily in my enterprise.
  • Since it can be easily deployed, the products can easily get deployed on all systems in the environment for optimal anti-malware protection.
Read full review
ScreenShots

Trellix Endpoint Security ENS Screenshots

Screenshot of The Monitoring workspace presents actionable endpoint threat detection without the noise.Screenshot of Automatically identify the key findings without requiring manual evaluation of each individual artifact.Screenshot of Visualization displays relationships and speeds analyst understanding.Screenshot of AI-guided investigations automatically provide answers to typical questions asked during a security incident and highlight the most relevant evidence.