TrustRadius: an HG Insights company

Adlumin, an N-able company

Score7.6 out of 10

47 Reviews and Ratings

What is Adlumin, an N-able company?

Adlumin is a security operations command center that simplifies complexity and keeps organizations of all sizes secure. Its technology and integrations create a platform that obtains security telemetry from across an organization to provide greater insights into security alerts and streamline workflows.

Adlumin is a great service and well worth the cost

Use Cases and Deployment Scope

We use Adlumin as an automated log review, monitoring, and protection system that scans for anomolies in our technology stack that could potentially be a problem. It then emails us and/or takes action depending on the settings we've configured and/or the defaults configured by the company.

The most obvious business use case is account compromise alerting and protection, but depending on your specific technology stack, it can also protect against phishing attacks, ransomware, and a number of other malicious scenarios.

Pros

  • Malicious actor detection through log analysis
  • Randomware protection through agent and canary files
  • Single pane of glass monitoring and visibility
  • Automated responses to malicious actions

Cons

  • Reducing extra noise - specifically, having the ability to mark certain accounts as "safe" so that we're not alerted whenever an admin installs an app
  • Clearer setup instructions - the initial setup call was good, but having knowledge base articles / self-help processes are always good
  • More integrations

Return on Investment

  • There's no way to accurately calculate the return on investment for preventing an attack, but the average cost of a business email compromise (from quick Google searching) is 135K. If we use that number, for us it's at least a 5x ROI even if it catches only one such attack (and it has caught more and other attacks besides)
  • It does take some managing (getting an AI alert for nothing late at night is not awesome) but that's far better than ignoring an attack.
  • It's not the cheapest tool, but it's a necessary one, especially in today's age of constant data breaches and password leaks.

Usability

Other Software Used

N-able N-central, N-able Take Control, Cove Data Protection

Need 24x7 Monitoring Try Adlumin.

Use Cases and Deployment Scope

I use Adlumin to monitor my network's health. It tells me what devices may be at risk, my overall network health, and if I am in compliance with Group Policies and account setup. In addition, Adlumin can detect whether an account has been exposed on the dark web. I can integrate my firewall, Azure, DUO, VPN, and EDR data to enhance monitoring. The other reason Adlumin is important to us is that we are a very small company, but we also need 24/7 network monitoring, and we don't have the manpower to do it on our own.

Pros

  • They respond very quickly when I have a question or concern.
  • They provide various ways to learn and be trained on their products.
  • They are consistently trying to update and improve their products.

Cons

  • They need to update some of their policies because they are not aligned with current best practices. Example: Passwords should be 14 characters and not change unless compromised, vs. changing them every 90 days.
  • A better training on using SOAR (Security Orchestration, Automation, and Response) and what the baseline/best initial setup practices are.
  • I also think it would be an improvement to have periodic live check-ins with clients so we can review the setup, strengthen security, and build a better working relationship.

Return on Investment

  • We used to be with an MSP before I was hired, and the company spent over 20K per year for that service. With N-Able, we have reduced the cost by over half.
  • I spend minimal time now patching computers because this is all automated. I sometimes have to patch a couple of machines because I missed a patch, but it has saved me a great deal of time.
  • I save a great deal of time with Board Reports because they are automatically generated for me each month.

Usability

Other Software Used

N-able N-sight RMM, N-able Passportal, Cove Data Protection

You wont be disappointed.

Use Cases and Deployment Scope

We use Adlumin, along with our EDR solution, with overlapping SOC coverage to ensure my clients are safe from ransomware and any kind of M365 token hijacking. We also use Adlumin for a SIEM solution that monitors all of our servers, firewalls, and switches.

Pros

  • Onboarding
  • Sales
  • Support
  • Post Sales Support.

Cons

  • Integration issues with Microsoft 365.
  • It would be great if it could be managed within the nAble platform.
  • Better and clearer understanding of how SOC Support works, contact numbers, email addresses, etc...

Return on Investment

  • Frees my techs to allow more focus on project related work.
  • Allows for after hours monitoring so my techs don't have to be on call as often.

Usability

Alternatives Considered

Netwrix Threat Manager and OpenText Access Manager

Other Software Used

INKY Behavioral Email Security Platform, Kaseya NOC Services, Microsoft 365 Business Premium

Adlumin Review and Experience

Use Cases and Deployment Scope

Accessium uses Adlumin not only for our own organization but those that we support as well. We are challenged with working with a diverse set of medical devices, specifically modalities such as MRI’s, CT’s, X-Ray, Ultrasound machines and more. These are all managed in at least part by their manufacturers but exist in mixed network environments which are managed by both our organization and in concert generally with internal client resources. Because of this there are multiple security profiles that we have to deal with and we have found ways to ingest this diverse log and data set to provide meaningful insights within Adlumin. We have been able to create custom rules to alert each manufacturer based on their own unique security profiles. This has enabled us to work in concert with the managed Adlumin SOC, our external vendor partners, the clients themselves and our own response team to stay ahead of suspicious activity in our medical imaging environments.

Pros

  • Ingestion of diverse log types
  • Display of complex data sets
  • Response and communication

Cons

  • Additional API support
  • More managed SOC options
  • More self led guides

Return on Investment

  • Since implementation we have had 0 incidents that went beyond the initial discovery phase.
  • We have realized a savings on our cyber insurance as well as our clients by demonstrating the capabilities inherit with our implementation.

Usability

Alternatives Considered

Arctic Wolf Managed Security Awareness

Other Software Used

Liongard, Sophos Managed Detection and Response

Good value for the price

Use Cases and Deployment Scope

I use Adlumin, an N-able company, as my SOC for customers willing to pay for advanced security services. It is helpful to outsource this as I don't have a budget for a 24/7 internal soc. This gets deployed to the majority of my customers. This also helps not have to sit through logs in a SIEM with the SOAR actions being able to respond to potential incidents more quickly than a human as well.

Pros

  • Simple onboarding and easy agent and integration setup.
  • Large number of external systems to integrate with
  • Pricing is very reasonable with reasonable minimums

Cons

  • SOC response times when I respond to a ticket can be slow at times. Specifically when a machine has been quarantined and I need to get it un-quarantined.
  • Responses to events are sometimes very generic. For example, a Linux system has an issue there's wording in the email notification that a windows defender scan was started. This isn't possible and lowers confidence in whether the response was effective or actually investigated.
  • Better Linux responses and investigations.
  • Additional integrations would be appreciated. A lot of the RMM tools and other integrations to the Adlumin platform are not in use in my organization so while there's a good number of integrations I can't link all of my security tooling.

Return on Investment

  • Protecting users from unauthorized sign ins and responding when there is an impossible sign in event with SOAR actions has saved our customers on multiple occasions.
  • Not having to respond directly to EDR events and letting the SOC take the first pass at them has saved countless hours of investigation internally.

Usability