We performed a comparison between Elastic Security and LogPoint based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Elastic Security is commended for its adaptability, extensive customization options, and seamless integration with the ELK Stack. LogPoint is noted for its advanced technology and extensive log-collection, parsing, and analysis mechanisms. Elastic Security could improve by reducing resource usage, automating threat response, and simplifying the user experience. LogPoint can improve its dashboard customization, resource efficiency, network hierarchy diagrams, and agent deployment.
Service and Support: Some Elastic Security users found their support helpful, while others experienced difficulties and delays. LogPoint's customer service receives high marks for its exceptional technical support and responsive engineers, but some users reported delays in receiving help from higher-level support.
Ease of Deployment: Elastic Security generally has a straightforward setup but may require trained specialists. The complexity of LogPoint's initial setup can range from complex and time-consuming to fast and easy, depending on the user's experience and the organization’s size.
Pricing: Elastic Security is considered affordable and cost-effective, with pricing based on the size of the monitored environment. LogPoint's fixed pricing model is seen as cost-effective and competitive.
ROI: Elastic Security has shown mixed results in terms of ROI, with some users expressing concerns about the quality of their premium support. LogPoint makes costs more predictable and enables companies to generate revenue through security operation services.
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"The product's initial setup phase is very easy."
"The setup is pretty simple."
"Ability to get forensics details and also memory exfiltration."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"It's very stable and reliable."
"The most valuable feature is the ability to collect authentication information from service providers."
"We like Elastic Security because it's a REST API-based solution. That's the primary reason we use it."
"The most valuable feature is the search function, which allows me to go directly to the target to see the specific line a customer is searching for."
"The solution is quite stable. The performance has been good."
"The intelligence of the system has been very impressive. It's not quite AI, but the technical bit where it correlates information, based on the seen attacks within an organization is good."
"The most valuable feature is the machine learning capability."
"It is very quick to react. I can set it to check anomalies or suspicious behavior every 30 seconds. It is very fast."
"The flexibility of the search feature and the solution's analytics features are the most valuable parts of the solution."
"It is an AI technology because it is using machine learning technology. So far, there is nothing better out there for UEBA in terms of monitoring endpoints and user activity. It is using machine learning language, so it is right at the top. It provides that capability and monitors all the activities. It devises a baseline and monitors if there is any deviation from the baseline."
"They basically charge you in a better way."
"The solution's most valuable aspect is the combination of the software and the support that they have."
"The solution's user interface is quite simple, and the integration is better than other products."
"The most valuable features are the ones that we use the most, which are the search and report facilities."
"The solution offers excellent reporting features. Our customers have been satisfied that they have been able to meet their compliance needs by giving them a standard report."
"The integration is very user-friendly. There are not many CLI commands. Everything is directly accessible from the web interface."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"It takes about two business days for initial support, which is too slow in urgent situations."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"The support needs improvement."
"I haven't seen the use of AI in the solution."
"Making the portal mobile friendly would be helpful when I am out of office."
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"The dashboard isn't easy to access and manage."
"The interface could be more user friendly because it is sometimes hard to deal with."
"They don't provide user authentication and authorisation features (Shield) as a part of their open-source version."
"The biggest challenge has been related to the implementation."
"One limitation of Elastic Security is that it does not have built-in workflows for all tasks. For example, if you need a workflow for compliance, you will need to create a custom workflow."
"We set up a cron job to delete old logs so that we wouldn't hit a disk space issue. Such a feature should be available in the UI, where old logs can be deleted automatically. (Don’t know if this feature is already there)."
"Improvements in Elastic Security could include refining and normalizing queries to make them more user-friendly, enhancing the user experience with better documentation, and addressing any latency issues."
"If you compare this with CrowdStrike or Carbon Black, they can improve."
"This solution cannot do predictive maintenance, so we have to build our own modules for doing it."
"One of the things we faced last year was that we had some memory issues with the server running. We were running them as virtual services, and we were facing some performance issues. Back then, there were some things that had already been solved at the end, but one of the small issues we had was that it was quite memory-consuming. After one upgrade that we did, we faced some performance issues."
"Dashboards could be developed further."
"It is complicated to collect daily logs from other systems."
"In terms of functionality, it is very good. The only issue is the documentation. Its documentation should be improved."
"The solution should offer more integrations and third-party solutions like incident response platforms or allow access to third-party big data"
"LogPoint can improve its dashboards. We are not able to customize the dashboard when creating them. They only have preset dashboards which do not have exactly what we are looking for."
"What could be improved in LogPoint is its UI because it's less friendly to users than LogRhythm. The UI could be more aesthetically appealing to users. It's completely outdated."
"Logpoint is not flexible. Its documentation is not user-friendly."
Elastic Security is ranked 5th in Security Information and Event Management (SIEM) with 59 reviews while Logpoint is ranked 26th in Security Information and Event Management (SIEM) with 20 reviews. Elastic Security is rated 7.6, while Logpoint is rated 7.4. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of Logpoint writes "Good technical support but it is complex to use and resource-heavy". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas Logpoint is most compared with IBM Security QRadar, Rapid7 InsightIDR, Microsoft Sentinel, Wazuh and LogRhythm SIEM. See our Elastic Security vs. Logpoint report.
See our list of best Security Information and Event Management (SIEM) vendors, best Log Management vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.