Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine EventLog Analyzer Reviews & Ratings
    210 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    168 Ratings
    Company Website
  • Graylog Reviews & Ratings
    417 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Daylight Reviews & Ratings
    10 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,305 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website
  • Criminal IP Reviews & Ratings
    17 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    684 Ratings
    Company Website
  • Blumira Reviews & Ratings
    150 Ratings
    Company Website

What is OpenText Enterprise Security Manager?

OpenText™ Enterprise Security Manager (ESM) is an advanced Security Information and Event Management solution designed to enhance cybersecurity operations through real-time threat detection, correlation, and automated response. Built on a cutting-edge correlation engine, it allows security analysts to identify and prioritize threat-correlated events as they occur, dramatically reducing detection and reaction times in dynamic cyber environments. ESM’s native Security Orchestration, Automation, and Response (SOAR) capabilities empower Security Operations Centers (SOCs) to automate workflows, leverage out-of-the-box playbooks, and manage incidents efficiently. The platform can ingest and analyze data from over 450 event source types, processing upwards of 100,000 events per second for enterprise-wide visibility. Organizations benefit from customizable rulesets, dashboards, and reports that can be tailored to meet unique business and compliance needs, making it highly scalable and adaptable. Multi-tenancy support simplifies management across distributed business units by enabling centralized control with detailed access permissions. Automated threat intelligence feeds keep security teams informed with the latest global threat data, while intelligent risk scoring prioritizes events to focus analyst attention on the most critical threats. The platform integrates seamlessly with existing SOC ecosystems and supports MITRE ATT&CK mapping for enhanced situational awareness. OpenText also provides professional services, customer success programs, and premium support to ensure smooth deployment and ongoing optimization. This comprehensive approach helps organizations reduce threat exposure, lower operational costs, and improve overall security posture.

What is Lumu?

The complexities inherent in data often conceal significant obstacles, particularly regarding metadata. Lumu’s Continuous Compromise Assessment model excels in its ability to collect, standardize, and analyze a wide variety of network metadata, including but not limited to DNS records, netflows, proxy and firewall access logs, and spam filters. This exceptional visibility from these data sources enables us to interpret the behaviors within your enterprise network, leading to profound insights into your specific levels of compromise. By providing your security team with reliable compromise data, you can ensure they are equipped for prompt and informed action. While preventing spam is certainly advantageous, a deeper examination of it is even more beneficial, as it uncovers the attackers targeting your organization, their techniques, and their rates of success. Lumu’s Continuous Compromise Assessment is enhanced by our pioneering Illumination Process, which aims to illuminate possible vulnerabilities. This innovative approach harnesses network metadata and advanced analytics to clarify the shadowy aspects of your network. By identifying these obscure areas, you can significantly bolster your overall security posture, ensuring a more robust defense against potential threats. Ultimately, understanding and addressing these vulnerabilities is crucial in maintaining a resilient security framework.

Media

Media

Integrations Supported

AllSecureX
Check Point IPS
Check Point Infinity
DNSWatch
DatAnswers
Google Digital Risk Protection
Harmony Mobile
Keepnet Labs
NXLog
Netwrix Threat Prevention
OpenText Security Log Analytics
Proficio
Qualys WAS
Recorded Future
Smokescreen
ThreatConnect Risk Quantifier (RQ)
Trustwave DbProtect
Varonis Data Security Platform
Vectra AI
Veriato Workforce Behavior Analytics

Integrations Supported

AllSecureX
Check Point IPS
Check Point Infinity
DNSWatch
DatAnswers
Google Digital Risk Protection
Harmony Mobile
Keepnet Labs
NXLog
Netwrix Threat Prevention
OpenText Security Log Analytics
Proficio
Qualys WAS
Recorded Future
Smokescreen
ThreatConnect Risk Quantifier (RQ)
Trustwave DbProtect
Varonis Data Security Platform
Vectra AI
Veriato Workforce Behavior Analytics

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

OpenText

Date Founded

1991

Company Location

Canada

Company Website

www.opentext.com/products/enterprise-security-manager

Company Facts

Organization Name

Lumu Technologies

Date Founded

2019

Company Location

United States

Company Website

lumu.io/product/

Categories and Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Categories and Features

Popular Alternatives

FortiSIEM Reviews & Ratings

FortiSIEM

Fortinet

Popular Alternatives

Huntsman SIEM Reviews & Ratings

Huntsman SIEM

Huntsman Security
Nagios Network Analzyer Reviews & Ratings

Nagios Network Analzyer

Nagios Enterprises