Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at UTMStack, reclaim access to make changes.
UTMStack
Save to My Lists
Unclaimed
Unclaimed

Top Rated UTMStack Alternatives

UTMStack Reviews & Product Details

UTMStack Product Details

Claimed

UTMStack Media

UTMStack Demo - Alerts overview
A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, and save the dashboard content. A dashboard displays essential information about user activity, alerts, vulnerabilities, and network traffic in your organization.UTMSTack supports several types of vis...
UTMStack Demo - Vulnerabilities and Access Right Manager overview
The UTMStack built-in vulnerability scanner can detect known and unknown vulnerabilities in the network. The Access Right manager overview displays a graphical organization's Active Directory view
Product Avatar Image

Have you used UTMStack before?

Answer a few questions to help the UTMStack community

2 UTMStack Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 UTMStack Reviews
5.0 out of 5
2 UTMStack Reviews
5.0 out of 5
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
AI
Mid-Market (51-1000 emp.)
"UTM-Stack SIEM Review"
What do you like best about UTMStack?

What stands out the most about UTMStack is the seamless integration of robust security functionalities with excellent customer support. The platform's advanced threat detection capabilities and customizable alerting mechanisms provide a comprehensive security solution. However, the exceptional support team at UTMStack deserves special mention. Their prompt response, willingness to assist, and extensive knowledge contribute to an outstanding experience, ensuring our organization stays protected against evolving threats. Review collected by and hosted on G2.com.

What do you dislike about UTMStack?

UTMStack effectively addresses the critical problem of comprehensive security management for our organization. By integrating various security functionalities into a single platform, UTMStack provides us with a centralized solution for threat detection, event correlation, and compliance reporting. This streamlined approach significantly improves our ability to detect and mitigate potential risks in real-time, enhancing our overall security posture. While UTMStack has proven valuable, there is room for improvement in terms of user interface complexity, particularly for less experienced users. Simplifying the interface and expanding integrations with other security tools would enhance usability and versatility. Addressing these areas would make UTMStack an even stronger and more user-friendly solution. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Small-Business (50 or fewer emp.)
Business partner of the seller or seller's competitor, not included in G2 scores.
"Cost effective and simple"
What do you like best about UTMStack?

Affordable and simple SIEM. A good option for medium-sized businesses that do not have the budget to purchase multiple tools. Review collected by and hosted on G2.com.

What do you dislike about UTMStack?

It is not available as a SaaS product. Installation can be complicated for users not familiar with command lines. Review collected by and hosted on G2.com.

There are not enough reviews of UTMStack for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(186)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
2
Palo Alto Networks Next-Generation Firewalls Logo
Palo Alto Networks Next-Generation Firewalls
4.5
(147)
Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.
3
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
4.4
(113)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
4
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(117)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
5
Cloud-Delivered Security Services Logo
Cloud-Delivered Security Services
4.4
(104)
Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 65,000 global customers to share intelligence from all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution.
6
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Logo
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
4.2
(92)
The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security that is both agile and integrated- leading to the strongest security posture available today and tomorrow. From your data center, branch offices, cloud environments, and everywhere in between, you can leverage the power of Cisco to turn your existing network infrastructure into an extension of your firewall solution, resulting in world class security controls everywhere you need them. Investing in a Secure Firewall appliance today gives you robust protections against even the most sophisticated threats without compromising performance when inspecting encrypted traffic. Further, integrations with other Cisco and 3rd party solutions provides you with a broad and deep portfolio of security products, all working together to correlate previously disconnected events, eliminate noise, and stop threats faster.
7
CrowdSec Logo
CrowdSec
4.7
(87)
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countries across 6 continents, the solution builds a real-time IP reputation database that keeps growing every day and benefits all community members who have each other's backs while forming a global defense shield.
8
Palo Alto Networks VM-Series Virtual Firewall Logo
Palo Alto Networks VM-Series Virtual Firewall
4.3
(74)
Palo Alto Networks VM-Series Virtual Firewall is a cloud security software that allows businesses to prevent data loss and threats with this virtualized firewall for private and public cloud environments. VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Cisco, Citrix, KVM, OpenStack, Amazon Web Services, Microsoft and Google.
9
Trellix Network Detection and Response (NDR) Logo
Trellix Network Detection and Response (NDR)
4.1
(66)
FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.
10
ExtraHop Logo
ExtraHop
4.6
(67)
ExtraHop Reveal(x) provides cloud-native visibility, detection, and response for the hybrid enterprise.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

UTMStack