Elastic Security vs. Infocyte HUNT

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Elastic Security
Score 8.4 out of 10
N/A
Elastic Security equips analysts to prevent, detect, and respond to threats. The free and open solution delivers SIEM, endpoint security, threat hunting, and cloud monitoring. The solution encompasses Elastic SIEM, which brings Elasticsearch to SIEM and threat hunting. The Elastic Agent (or Elastic Endpoint Security based on the former Endgame security product acquired by Elastic in late 2019) brings signatureless malware prevention to endpoints, as well as security data collection for…N/A
Infocyte HUNT
Score 10.0 out of 10
N/A
Infocyte HUNT aims to provide an easy-to-use, yet powerful enterprise endpoint security solution. Infocyte HUNT is a threat hunting software/platform designed to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully breached existing defenses. According to the vendor, Infocyte HUNT uses a forensic…N/A
Pricing
Elastic SecurityInfocyte HUNT
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Elastic SecurityInfocyte HUNT
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional Details
More Pricing Information
Community Pulse
Elastic SecurityInfocyte HUNT
Best Alternatives
Elastic SecurityInfocyte HUNT
Small Businesses
LevelBlue USM Anywhere
LevelBlue USM Anywhere
Score 4.4 out of 10
NinjaOne
NinjaOne
Score 9.1 out of 10
Medium-sized Companies
Sumo Logic
Sumo Logic
Score 9.3 out of 10
Cisco Meraki MX
Cisco Meraki MX
Score 9.1 out of 10
Enterprises
Sumo Logic
Sumo Logic
Score 9.3 out of 10
Cisco Meraki MX
Cisco Meraki MX
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Elastic SecurityInfocyte HUNT
Likelihood to Recommend
9.0
(1 ratings)
-
(0 ratings)
Support Rating
7.0
(1 ratings)
-
(0 ratings)
User Testimonials
Elastic SecurityInfocyte HUNT
Likelihood to Recommend
Elastic
I believe Endgame is well suited to organizations that have their own Cybersecurity department. Its not well suited for organizations that don't have a Cybersecurity department.
Read full review
Infocyte
No answers on this topic
Pros
Elastic
  • Identify 0-day malware.
  • Provides a few forensic details on endpoints.
  • Very easy to administer.
Read full review
Infocyte
No answers on this topic
Cons
Elastic
  • I would love that it provided more memory analysis details.
  • Being able to edit sensor profiles after creating them.
  • I would love it if it provided more automation features.
Read full review
Infocyte
No answers on this topic
Support Rating
Elastic
Even though their support is good, I think there are some areas where they need to provide more thorough solutions to issues, some of their solutions are pretty basic and have already been tried.
Read full review
Infocyte
No answers on this topic
Alternatives Considered
Elastic
Endgame is based on the MITRE framework which has proven to be a successful framework to identify various attack patterns that attackers use. Also, compared to the others it's easier to administer and manage.
Read full review
Infocyte
No answers on this topic
Return on Investment
Elastic
  • Being able to identify threats we couldn't identify before.
  • Easier management of endpoints.
  • Being able to immediately isolate endpoints remotely that have high severity threats.
Read full review
Infocyte
No answers on this topic
ScreenShots

Infocyte HUNT Screenshots

Screenshot of Analyze > Summary: Infocyte HUNT displays an overview of potential cyber security threats — objects and hosts. From here, you can drill down into specific threat types (along the left side of the screen).Screenshot of Analyze > Processes: View all the processes running on your endpoints (across your network) and dive into specific processes to understand what resources they're utilizing and if they are in fact a threat.Screenshot of Discover > Target Group: Create and manage multiple "Target Groups" within your network. Discover the hosts on your network and quickly assess what protocols they're using.