Alienvault - the friend from another world
November 04, 2021

Alienvault - the friend from another world

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with AlienVault OSSIM

AlienVault [OSSIM] is being used across the entire organization. It has an intelligent analytic engine to determine potential threats in our network. The dashboard provides a clear presentation of alerts and allows you to drill down into an alert to determine detailed information for research. It is also customizable to create rules and send email notifications.
  • Behavioral monitoring
  • Vulnerability assessment
  • Intrusion detection
  • Creating custom rules is a bit complicated
  • Reporting could be improved
  • Agent has caused conflicts with a couple of our other applications
  • Event log collection
  • Behavioral monitoring
  • SIEM event correlation
  • Satisfied audit needs
  • Increased security visibility in our network
  • Up to date on current threats
We did not evaluate or use any other product previous to AlienVault [OSSIM]. We had a specific need to meet our audit requirements and AlienVault [OSSIM] provided all the features needed as well as being simple enough to deploy without any dedicated staff. Real-time alerts from custom rules gives us a heads-up immediately to investigate any threat.

Do you think AlienVault OSSIM delivers good value for the price?

Yes

Are you happy with AlienVault OSSIM's feature set?

Yes

Did AlienVault OSSIM live up to sales and marketing promises?

Yes

Did implementation of AlienVault OSSIM go as expected?

Yes

Would you buy AlienVault OSSIM again?

Yes

If you don't have staff do dedicate solely to SIEM, AlienVault [OSSIM] is simple enough to get up and running and configure enough rules and notifications so that it does not require dedicated staff to constantly monitor. Vulnerability scanning has a lot to be desired - suggest using a system with more robust vulnerability scanning features.

AlienVault OSSIM Feature Ratings

Centralized event and log data collection
8
Correlation
8
Event and log normalization/management
8
Deployment flexibility
8
Integration with Identity and Access Management Tools
8
Custom dashboards and workspaces
8
Host and network-based intrusion detection
9
Log retention
6
Data integration/API management
6
Behavioral analytics and baselining
8
Rules-based and algorithmic detection thresholds
7
Response orchestration and automation
Not Rated
Reporting and compliance management
5
Incident indexing/searching
7