Sentinel Has Come A Long Way
August 16, 2021

Sentinel Has Come A Long Way

Michael Bobo | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with Azure Sentinel

Azure Sentinel was rolled out to the entire organization as part of a security initiative for our cloud environment. Being in a smaller IT group, but with lots of employees, it was important that we have a system that was awake when we weren't, and watching when we couldn't.
  • Automated detection and response
  • Detailed user/device information
  • Part of the MS cloudsphere, so has a familiar feel.
  • In the WFH world sometimes it would be nice to have a local client version when speed isn't the best from home
  • The ability to alert on a mobile device
  • A mobile app to do an investigation while on the move
Net Positive ROI - this has replaced expensive hardware that had expensive maintenance contracts and didn't give the indepth reporting.
  • Built-in/native behavioral analytics (baselining)
They have given baseline visibility into what our employees are doing with their equipment and actionable items for us to review.
My only real negative is a missing mobile app that would allow for on the move investigations.

Do you think Azure Sentinel delivers good value for the price?

Yes

Are you happy with Azure Sentinel's feature set?

Yes

Did Azure Sentinel live up to sales and marketing promises?

Yes

Did implementation of Azure Sentinel go as expected?

Yes

Would you buy Azure Sentinel again?

Yes

I haven't yet had to use support for Sentinel.
Did not use professional services
With everything moving to a pay per month per user plan it would be nice to have some rollup products that just included everything.
It is well suited if you are in a mostly Microsoft shop and want integrated security and tracking. It does work with other OSs but the depth of information and abilities is not as robust.

Azure Sentinel Feature Ratings

Centralized event and log data collection
10
Correlation
10
Event and log normalization/management
9
Deployment flexibility
6
Integration with Identity and Access Management Tools
10
Custom dashboards and workspaces
8
Host and network-based intrusion detection
8
Log retention
9
Data integration/API management
9
Behavioral analytics and baselining
9
Rules-based and algorithmic detection thresholds
9
Response orchestration and automation
9
Reporting and compliance management
9
Incident indexing/searching
9