Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Blumira Reviews & Ratings
    145 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    140 Ratings
    Company Website
  • ConnectWise SIEM Reviews & Ratings
    191 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    190 Ratings
    Company Website
  • Graylog Reviews & Ratings
    385 Ratings
    Company Website
  • UptimeRobot Reviews & Ratings
    747 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    483 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,195 Ratings
    Company Website
  • Fraud.net Reviews & Ratings
    56 Ratings
    Company Website

What is Splunk Enterprise Security?

The top SIEM solution provides significant visibility, improves detection precision through contextual understanding, and enhances operational efficiency. This exceptional level of visibility is made possible by effectively consolidating, normalizing, and analyzing vast amounts of data from various sources, all facilitated by Splunk's powerful, data-centric platform that incorporates advanced AI capabilities. Utilizing risk-based alerting (RBA) — a standout feature of Splunk Enterprise Security — organizations can dramatically reduce alert volumes by up to 90%, enabling them to concentrate on the most pressing threats. This functionality not only boosts productivity but also guarantees that the monitored threats are of high credibility. Additionally, the seamless integration of Splunk SOAR automation playbooks with the case management functionalities of Splunk Enterprise Security and Mission Control fosters a unified working environment. By enhancing the mean time to detect (MTTD) and mean time to respond (MTTR) for incidents, teams can significantly improve their overall incident management efficiency. This holistic strategy ultimately cultivates a proactive security stance capable of adapting to changing threats, ensuring that organizations remain one step ahead in their defense. As a result, they can confidently navigate the complex landscape of cybersecurity challenges that lie ahead.

What is OpenText Enterprise Security Manager?

OpenText™ Enterprise Security Manager (ESM) is an advanced Security Information and Event Management solution designed to enhance cybersecurity operations through real-time threat detection, correlation, and automated response. Built on a cutting-edge correlation engine, it allows security analysts to identify and prioritize threat-correlated events as they occur, dramatically reducing detection and reaction times in dynamic cyber environments. ESM’s native Security Orchestration, Automation, and Response (SOAR) capabilities empower Security Operations Centers (SOCs) to automate workflows, leverage out-of-the-box playbooks, and manage incidents efficiently. The platform can ingest and analyze data from over 450 event source types, processing upwards of 100,000 events per second for enterprise-wide visibility. Organizations benefit from customizable rulesets, dashboards, and reports that can be tailored to meet unique business and compliance needs, making it highly scalable and adaptable. Multi-tenancy support simplifies management across distributed business units by enabling centralized control with detailed access permissions. Automated threat intelligence feeds keep security teams informed with the latest global threat data, while intelligent risk scoring prioritizes events to focus analyst attention on the most critical threats. The platform integrates seamlessly with existing SOC ecosystems and supports MITRE ATT&CK mapping for enhanced situational awareness. OpenText also provides professional services, customer success programs, and premium support to ensure smooth deployment and ongoing optimization. This comprehensive approach helps organizations reduce threat exposure, lower operational costs, and improve overall security posture.

Media

Media

Integrations Supported

AllSecureX
Apache Kafka
Cassandra
Check Point Infinity
Cyware
FortiSandbox
IRONSCALES
Kona Site Defender
Kubernetes
LOGIQ
NGINX
Netwrix Threat Prevention
ShadowPlex
Smokescreen
Teramind
Titania Nipper
Varonis Data Security Platform
Veriato Workforce Behavior Analytics
alphaMountain Threat Intelligence APIs and Feeds
gPanel

Integrations Supported

AllSecureX
Apache Kafka
Cassandra
Check Point Infinity
Cyware
FortiSandbox
IRONSCALES
Kona Site Defender
Kubernetes
LOGIQ
NGINX
Netwrix Threat Prevention
ShadowPlex
Smokescreen
Teramind
Titania Nipper
Varonis Data Security Platform
Veriato Workforce Behavior Analytics
alphaMountain Threat Intelligence APIs and Feeds
gPanel

API Availability

Has API

API Availability

Has API

Pricing Information

Free
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Cisco

Date Founded

1984

Company Location

United States

Company Website

www.splunk.com/en_us/products/enterprise-security.html

Company Facts

Organization Name

OpenText

Date Founded

1991

Company Location

Canada

Company Website

www.opentext.com/products/enterprise-security-manager

Categories and Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Categories and Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Popular Alternatives

FortiSIEM Reviews & Ratings

FortiSIEM

Fortinet
Huntsman SIEM Reviews & Ratings

Huntsman SIEM

Huntsman Security