Fabulous for small IT teams and organizations
April 10, 2023

Fabulous for small IT teams and organizations

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Blumira

Blumira is our SIEM. We forward logs from lots of devices to Blumira via syslog and a few direct integrations. Blumira analyzes and processes those logs to look for IOCs and other risks. Blumira helps monitor activity on devices where we cannot install our antivirus agent -- effectively filling a gap in our coverage.
  • The user interface (for managing, reporting) is intuitive and is easy to use
  • The setup / onboarding process was very easy
  • Support has been wonderful (and personal)
  • We've had a few suggestions for improving some of the built-in "workflows" -- steps that we are instructed to take by Blumira for specific "findings"
  • There are a few improvements about reporting I'd like to see
  • Now when we have a security audit or need to completed a cybersecurity insurance application, we answer "Yes" to the "Do you have a SIEM?" question.
  • It has provided awareness and visibility of events and situations on our system that we were completely blind to before.
Blumira is "right-sized" for my small organization. It is not a strain on our resources (people, system, or monetary). It gives us exactly what we needed.

Do you think Blumira delivers good value for the price?

Yes

Are you happy with Blumira's feature set?

Yes

Did Blumira live up to sales and marketing promises?

Yes

Did implementation of Blumira go as expected?

Yes

Would you buy Blumira again?

Yes

LastPass for Business, BlackBerry Protect (CylancePROTECT), BlackBerry Optics (CylanceOPTICS)
Blumira is great for a small IT team in a small to medium sized environment. It gives you unlimited logging (no limit on the number of logs sent) and doesn't require advanced knowledge or expertise in SIEMs to get the system up and running.

Blumira Feature Ratings

Centralized event and log data collection
10
Correlation
9
Event and log normalization/management
9
Deployment flexibility
9
Integration with Identity and Access Management Tools
9
Custom dashboards and workspaces
9
Host and network-based intrusion detection
9
Log retention
9
Data integration/API management
9
Rules-based and algorithmic detection thresholds
9
Response orchestration and automation
8
Reporting and compliance management
8
Incident indexing/searching
8