Overview

Product video
Anvilogic breaks the SIEM lock-in that drives detection gaps and high costs for enterprise SOCs. It enables detection engineers and threat hunters to keep using their existing SIEM while seamlessly adopting a scalable and cost-effective data lake for high-volume data sources and advanced analytics use cases. By eliminating the need for rip-and-replace, Anvilogic allows security leaders to confidently join the rest of the enterprise on the modern data stack without disrupting existing processes. Security operations teams at banks, airlines, and large tech companies use Anvilogic's modular detection engine, thousands of curated threat scenarios, and AI security copilot to improve detection coverage and save millions of dollars. Private offer only. Offered plans are by an organization's employee count, and offer can also include Copilot, Insights and/or Unified Detect add-ons.
Highlights
- Leverage thousands of ready-to-deploy detections across multiple query languages (SPL, SQL, KQL) with new detections released weekly by the Anvilogic Forge Team.
- AI-Powered recommendations for automated tuning, maintenance and health insights
- Customize and scope your most relevant MITRE ATT&CK techniques
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
Anvilogic Core Detect 2k Employees | Anvilogic Core Detect: Up to 3 seats | $80,000.00 |
Anvilogic Core Detect 5k Employees | Anvilogic Core Detect: Up to 10 seats | $185,000.00 |
Anvilogic Core Detect 20k Employees | Anvilogic Core Detect: Up to 20 seats | $310,000.00 |
Anvilogic Core Detect 100k Employees | Anvilogic Core Detect: Up to 30 seats | $575,000.00 |
Anvilogic Core Detect Additional Seat (qty 1) | Anvilogic Core Detect: Additional Seat | $3,000.00 |
Anvilogic Core Detect Additional Employees (qty 100) | Anvilogic Core Detect: Additional Employees | $1.00 |
Anvilogic Copilot Additional Questions (qty 1) | Additional questions, only applicable to Copilot purchase. | $1.00 |
Vendor refund policy
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
FedRAMP
GDPR
HIPAA
ISO/IEC 27001
PCI DSS
SOC 2 Type 2
Standard contract
Customer reviews
Ai-driven detection has reduced false positives but data ingestion still needs improvement
What is our primary use case?
Anvilogic serves as our main SIEM and detection engineering platform. We use Anvilogic to create alerts based on our data, and the AI capability to detect alerts based on whatever data we are feeding into it is a feature that our team at Kroll particularly values.
We have SentinelOne data, which is our EDR, and we have EDR data directly set up through Anvilogic input without using any third-party tool to get that data. Anvilogic has integrations directly in place, and we are using the SentinelOne input through Anvilogic. Since we uploaded or ingested that data, Anvilogic has started to give us suggestions about what alerts could be fired through that data. Anvilogic has flagged the threat identifiers through which we can build some use cases or modify them for our use. Anvilogic has also helped us understand what is a false positive and what could be a promising use case for our company in particular, providing valuable support.
Regarding how Anvilogic supports our detection engineering, the uniqueness is about AI, which we did not have in Splunk earlier. This helps us not only to close the false positives but also features AI to write our queries. This capability lifts a lot of burden from the SOC team as they do not have to focus on how to write a query but can concentrate on investigating an alert or a use case, which has really caught my eye, and I am glad we have onboarded that feature.
How has it helped my organization?
Anvilogic has positively impacted our organization with a significant decrease in false positives and providing the independence of multiple data repositories, allowing us the choice of having different repositories. This flexibility enhances our operational efficiency, and the AI also assists with writing queries, making it scalable and cost-effective as we can adjust according to our needs.
What is most valuable?
The best features that Anvilogic offers include its independence from a particular solution, allowing us to have Snowflake as a data repository now and the flexibility to move to other platforms such as Databricks or Splunk while keeping our detections intact. Another valuable feature is the AI capability, which not only assists in detection but also helps us to write queries, completing multiple tasks efficiently. Additionally, Anvilogic is a no-code platform, so the base search is already ready for us, and we just have to tweak it according to our use cases. Anvilogic's new features enable us to improve SOC efficiency and filter out a lot of false positive alerts. Additionally, it has an attached MITRE framework, automatically detecting it so we do not have to manually add the MITRE framework IDs as we did in Splunk.
Among those features, the one that has made the biggest difference for our team is the AI capability; we have seen a significant shift in our SOC operations. Many false positives are handled by the AI, allowing the team more time to discuss and investigate the actual use cases. Each use case also includes a description of what it is trying to detect, which helps engineers understand the use case's purpose without needing to reach out to seniors for clarification.
What needs improvement?
Currently, there is a limitation of 100 inputs in Anvilogic integrations, which is less than our needs, making it a challenge to fit all our inputs. Additionally, I believe the documentation should be publicly accessible. We work with different teams to get the data, but since the documentation is not available to everyone, we often have to explain how to make integrations. Also, there are features that do not work as expected; for example, we recently tried to ingest an AWS CloudTrail input to which Anvilogic could not accept any more data past a certain point, forcing us to look for alternatives. We have found that data mapping is sometimes not adequate, as it can only parse JSON data, contrary to the documentation suggesting that CSV or XML formats are acceptable, which has caused issues.
For how long have I used the solution?
I have been working in my current field for three years, and it has been one year that we have moved to Anvilogic. Prior to that, we were using Splunk as our data ingestion platform and as well as SIEM.
What do I think about the stability of the solution?
Anvilogic is somewhat stable. Regarding data inputs, we have had issues, but in terms of downtime, we have not experienced any.
What do I think about the scalability of the solution?
Anvilogic is quite scalable, allowing us to significantly lower storage and processing costs compared to legacy SIEM-only approaches. Thanks to having a different data repository, we do not crowd Anvilogic with data and accordingly adjust it to our specific needs.
How are customer service and support?
Customer support is generally good, though we sometimes have to wait longer for answers, which can be a bit frustrating, but overall the support is satisfactory.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were previously using Splunk and decided to switch due to its lack of AI capabilities related to the SIEM product. We also evaluated other options before settling on Anvilogic.
What other advice do I have?
The AI capabilities mentioned on Anvilogic's website are indeed good and promising; however, there are areas that require work, particularly concerning data ingestion. Users may encounter roadblocks while integrating inputs, as we faced significant delays due to data input inconsistencies.
Initially, the triage piece was not integrated into Anvilogic's UI, but since its integration, it has helped the team to easily check the triage dashboard and assess current use cases, encouraging us to continue seeking new ways to use it more efficiently.
The moment we realized we needed something better was triggered by Splunk's lack of AI integration, which prompted my manager to consider Anvilogic due to its promising AI features. Since onboarding, we have evolved to remove false positives effectively, which was a challenge with Splunk, allowing for fewer alerts due to Anvilogic's capabilities. Additionally, we no longer need to be dependent on a particular data repository, benefiting from the flexibility that Anvilogic provides.
I rate Anvilogic a six out of ten. I chose a six out of ten for Anvilogic because, despite the impressive detection capabilities and intriguing features, I still see a need for improvement with the data ingestion process. If the data is not ingested properly, the detections could be compromised. While it excels at detection and offers good use cases, my personal experiences with certain problems influenced the decision to rate it just above average.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Platform has transformed incident triage and correlation while reducing detection costs
What is our primary use case?
What is most valuable?
I currently utilize multiple of Anvilogic's AI features, both for fine-tuning and developing new content, as well as the threat intelligence feeds that it provides.
In my opinion, the best features Anvilogic offers are the AI features, which are great, and their common language rule tuning and modeling is much simpler than those other vendors that require query building skills.
The common language rule tuning and modeling have made things easier for my team because it is broken down into multiple smaller chunks rather than one large chunk of code. Multiple smaller, pre-processed data points are basically visible and editable in those smaller chunks without having to actually code at all.
Anvilogic has impacted my organization positively because it is native for cloud-type infrastructures and they have a significant proactive approach to cost licensing. Rather than having to import all data, it actually sits on top of Snowflake , which reduces overall cost for data storage itself. Since implementing Anvilogic, our overall costs have been reduced.
What needs improvement?
Anvilogic can be improved further by maturing certain intelligence aspects outside of articles. This is an aspect that lacks in most SIEM and secure analytics tools, but personally the framework or "barebone" is in Anvilogic, it just needs further maturing
For how long have I used the solution?
I have been using Anvilogic for six months.
What do I think about the stability of the solution?
Anvilogic is stable.
What do I think about the scalability of the solution?
Anvilogic's scalability is good and it scales properly.
How are customer service and support?
I have not directly worked with customer support since I am a manager, but I have not heard any complaints from my employees.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
I previously used top tier SIEM 's. I switched to Anvilogic because it looked overall better and proved to be a better fit for our type of architecture.
What was our ROI?
I have seen a return on investment in the form of time saved developing new content.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing was straightforward. They provide estimates because obviously every business is different, but they provided reasonable estimates that were fairly accurate based on other customers from a similar type of background or size.
Which other solutions did I evaluate?
Before choosing Anvilogic, I evaluated other options. including vendors in the top quadrant
What other advice do I have?
Anvilogic has changed how my team thinks about detection and data usage because it makes it easier to follow than other tool sets. Since a lot of the content is dynamic, you can follow the trail in the threat hunt perspective compared to other tools where you have to manually recreate a new query to investigate the action further.
The moment that led me to choose Anvilogic was triggered because we normally evaluate vendors every so often to make sure we have a proper solution in place.
My usage of Anvilogic has evolved since onboarding and it is a bit more mature now, which certainly does help.
When other teams ask about Anvilogic, I tell them that it is fairly good.
There has not been anything that has become easier to justify or explain to leadership since adopting Anvilogic.
My advice to others looking into using Anvilogic is to conduct a test or proof of concept based on your actual future stance so that you feel the proper controls and everything is adequate to where you want to go.
I am looking forward to seeing how the tool will evolve and grow, especially with the AI features. I would rate this product overall as a 9 out of 10.
Detection engineering has become consistent and now coordinates multi-platform threat rules
What is our primary use case?
My main use case for Anvilogic is coordinating and tracking indicators of compromise and detection rules. I use Anvilogic for coordinating and tracking indicators of compromise or detection rules by feeding detection rules into Splunk, our Splunk environment, and these are turned into actionable alerts for our security operations center.
How has it helped my organization?
Anvilogic has positively impacted my organization by being a force multiplier for our security operations center and has allowed us to coordinate and distribute work more efficiently and provide consistency among the multiple SIEM environments.
I was able to create 90 detection scenarios in the first two weeks of using Anvilogic, which showcases how it improved efficiency and consistency for my team.
What is most valuable?
The best features Anvilogic offers are consistent recording and tracking of detection engine detection rules as they adapt over time to adversary's behaviors, and the ability to operate in multiple security SIEM environments.
Anvilogic works for my team by providing a single point of contact to put detection engineering rules that then get distributed to all of the various event management engines, as we have multiple SIEM environments in our company, including Microsoft Defender, Splunk, Elastic, and others.
Anvilogic has changed how my team thinks about detection by allowing us to no longer apply the same configurations and correlation rules in multiple Splunk environments and can transparently search across multiple SIEMS platforms.
What surprised me the most about Anvilogic once I started using it is the ease of creating and maintaining custom threat intel and threat scenarios.
What needs improvement?
Anvilogic can be improved with more support for cross-platform and native detection languages such as Sigma and Yara rules.
For how long have I used the solution?
I have been using Anvilogic for about six months.
What do I think about the stability of the solution?
Anvilogic has been very stable and reliable.
What do I think about the scalability of the solution?
Anvilogic's scalability has been great as it has been able to scale and perform well, better than the available resources we have to throw at it, and we have not run into any issues with our analysts not being able to access Anvilogic and perform their activities efficiently.
How are customer service and support?
Anvilogic customer support has been very productive to work with.
How would you rate customer service and support?
What was our ROI?
I have seen a return on investment in that Anvilogic has been more of a fundamental enablement technology than a return on investment, but it has definitely allowed us to move more quickly with integrating our corporate acquisitions as well as with our corporate colleagues who use other SIEM technologies.
What other advice do I have?
When other teams ask about Anvilogic, I tell them it makes detection engineering into a process rather than a one-time operation.
I convinced my leadership to adopt Anvilogic by comparing it to the manual operations and the overhead of repeated detection engineering processes.
My advice for others looking into using Anvilogic is to start with the configurations and detection rules that come prepackaged, and then reach out and create your own to expand your capabilities; once you start using this system, it becomes much easier and more efficient than manually maintaining detection rules.
I provide this review with a rating of 10.
Modern threat detection has improved coverage and reduced costs but still needs better UX and flexibility
What is our primary use case?
Anvilogic serves as our security analytics tool on top of our security data lake.
In my day-to-day work, we perform detection engineering on Anvilogic , and we also use the Armory to provide us with strong coverage from a MITRE perspective and security coverage over our logs to ensure that we can detect threats and respond to those threats efficiently and effectively.
We pursued Anvilogic as a piece of the puzzle to replace Splunk, our legacy SIEM platform, and it was a big part of being able to decouple the detection capabilities that Anvilogic offers from the data storage capabilities of a data lake, which is a big use case as well.
What is most valuable?
One of the best features Anvilogic offers is the Armory , which is full of various different pre-built detections; that was a huge improvement from any kind of pre-built detections we had in Splunk and saved a lot of time to really increase our coverage capability. I also appreciate the normalization process for log sources, normalizing them to a consistent schema where those alerts automatically apply is a nice feature and gives us a very clear-cut way to handle lots of different log sources in a centralized manner, ensuring that we are doing threat detection on those log sources.
The normalization process has enhanced our log monitoring maturity; previously in Splunk, we had SIEM mapping set up for log sources, but it did not translate necessarily to immediate security value because there were not pre-built detections that leveraged that SIEM mapping. The ability for Anvilogic to have built-in curated detection logic that automatically applies once we normalize logs creates immediate maturity and value every time we normalize a log source. It gives us a target to identify if a log source should be normalized. If it should, we know the value and output from Anvilogic; if it should not, we can identify custom use cases and build custom logic in Anvilogic or hold onto those logs in our data lake without any detections running on them if it is more for compliance or incident response.
Anvilogic plus Snowflake has vastly improved our total cost of ownership for the SIEM platform; we went from a pretty expensive platform in Splunk that was not vertically scalable due to budget limitations to a platform now that is far more efficient per terabyte of data ingested and processed per day. The savings per terabyte of data being ingested and monitored for security threats was a pretty significant percentage, which was a huge advantage. We now have budgetary space to scale up our solution as needed as the business grows.
We have had to make difficult decisions to not ingest certain logs in the past due to budgetary restrictions, but now we can take a more liberal approach in accepting most requests and ingesting those logs into our SIEM because the cost to do so is not a problem for the company and for our internal budgets, which is huge.
What needs improvement?
There is room for growth in the product platform; our detection engineers using Anvilogic every day encounter some frustrating UX experience issues where buttons are not logically placed, and workflows are not working as expected. There is also room for growth in integrating the platform with third parties, as we have encountered limitations in what can be executed via API and what is documented. We are a heavy automation integration team, so having this well documented is important for us. The enterprise capabilities within the platform also seem somewhat limited, as we run into limitations in managing detections at scale and making changes to those detections at scale. Especially at an enterprise level, if we need to add enrichment logic to every single detection deployed, it can be quite onerous; we had to develop custom scripts to manage that. Thus, enhancing enterprise-type features for managing the platform at scale rather than clicking through the GUI is important as we continue to grow. Additionally, the AI capabilities have been somewhat unstable and unintuitive to use, which is key for increasing adoption.
One other thing is that the detection logic builder today is somewhat limited in flexibility regarding implementing detections, grouping detections together, and handling alerts when they fire. This might be partly due to our need to adjust to a different platform, but flexibility is key for any enterprise platform to meet our unique business requirements. Having the capability to build custom detection logic not tied to a specific structure would be helpful; although a lot can be done, it often requires working with our account team which is time-consuming and less intuitive.
For how long have I used the solution?
I have been working in my current field for a little under 10 years.
What do I think about the stability of the solution?
Generally, Anvilogic is stable, although we have experienced some usability issues; the biggest instability has been with the AI agent, which the team is not using fully due to inconsistent results. Aside from that, the platform itself is stable.
What do I think about the scalability of the solution?
Anvilogic's scalability is quite good; however, we require more and more detection capabilities, and there is a ceiling based on what the Armory offers or what our team can custom develop. I would love to see an increase in out-of-the-box detections curated by the team, which would be a significant value add. As for the platform technology being based on Snowflake, it has essentially unlimited scalability, so I have no concerns there.
How are customer service and support?
Customer support is great, particularly from our immediate contact, Brad, who is very engaged and responds quickly, dedicating time to answer questions and onboard us effectively. However, outside of him, the process can get vague, with requests sometimes disappearing and lacking a clear tracking system, but overall, the experience is generally positive with some expected challenges from a smaller team.
Which solution did I use previously and why did I switch?
We previously used Splunk and switched to Anvilogic + Snowflake.
The moment we realized we needed something better was triggered by the lack of detection coverage and the overhead required to improve detection in Splunk, along with the non-scalable cost of operating it. We constantly dropped logs from monitoring, which is not the focus of a security organization; we wanted better coverage and monitoring, and that is what Anvilogic and Snowflake enabled us to achieve.
How was the initial setup?
Since onboarding, we started with rough, quick migrations of log sources and detections from Splunk to Anvilogic, but we have since cleaned up a lot of our normalization tasks and ensured things are correctly categorized, steadily deploying more Armory detections onto our existing data sets for better coverage.
What was our ROI?
While I do not have specific metrics, we have certainly seen a return on investment, mainly in time taken to improve detection coverage and the ability to detect threats on our logs. The Armory has greatly increased our coverage while reducing the time that would have been needed to develop detections ourselves in Splunk. However, the volume of alerts generated is shifting the cost to the operations side, requiring us to ensure that detections are tuned and alerts are efficiently firing to prevent noise that could increase costs for operations personnel and risk missing incidents.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing has been overall positive; the Anvilogic team has been very engaged throughout the process, which helped us adopt the platform. Weekly calls and a hands-on approach over the significant changes in how we do SIEM have been beneficial. Licensing is reasonably affordable and should be evaluated over time concerning the platform's value. Setup costs primarily involved internal work to configure our pipelines, but mostly consisted of man-hours.
Which other solutions did I evaluate?
We evaluated various options before choosing Anvilogic, including Gurucul, Panther Security, and Splunk Cloud, among others. Ultimately, we found Anvilogic to be the best fit for our needs.
What other advice do I have?
Another feature we are excited about, but we have not seen the value in yet, is the AI capabilities for detection engineering; it is, in theory, going to be very powerful and really reduce our time to develop new detections. There are more agentic features coming on the roadmap that have not been released yet, and we have not been able to see the full picture of value of that aspect of the product yet, but in theory, those should be extremely beneficial and really magnifying the amount of detection engineering work our team can do.
What surprised me the most about Anvilogic was the modern solution it offered to solving a SIEM business problem, which was different from other vendors. Anvilogic being a detection engineering tool makes sense and allows us to run it on any data lake background, which is unique. This decoupling of security detection from security data storage enabled us to pursue this path.
If Anvilogic disappeared tomorrow, we would lose our detection capability, which would be significant and necessitate finding another vendor's solution.
I rate Anvilogic about a seven on a scale of 1 to 10.
I chose a seven because the platform is a huge improvement from our legacy SIEM platform in Splunk, especially from a detection perspective. However, there are certainly opportunities to improve the user experience and capabilities, as well as to mature the platform. These three aspects make a difference in execution and can improve competitive edge significantly.
I convinced our leadership to adopt Anvilogic by emphasizing the cost benefits of increased capabilities at a lower cost. The Anvilogic-Snowflake combination presented a centralized source, which is advantageous for reusing security data across other non-SIEM use cases, making it an easy sell.
My advice for others considering Anvilogic is that depending on your company's detection engineering needs and maturity with your legacy SIEM platform, Anvilogic can provide a swift, significant value add. If you have a dedicated SIEM team with many custom use cases built on a platform such as Splunk, Anvilogic may not be the correct fit. We were a small team managing a complex old system and were not getting the full value from Splunk. Anvilogic provided a more dynamic, low-overhead solution, making it a great fit for us, but for larger teams with custom detection needs, it might be less flexible.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Detection workflows have improved with strong version control but need better CI and access control
What is our primary use case?
I primarily use Anvilogic as a wrapper over SIM, mainly Splunk, but it can also be applied to other SIM platforms like Kibana. I utilize it for versioning the rules and detection logic I write, which can get stale or require enhancement. For example, if I wrote a detection rule for detecting script execution that needed additional logic, I used Anvilogic to maintain those versions or to build behavioral detection patterns, which is complicated in Splunk alone.
Anvilogic allows me to extract a plethora of information, including mapping TTPs assigned for detection logic, which effectively helps in setting quarterly coverage agendas, thus illustrating its vital role in detection strategy and management presentations. The first thing that would break without Anvilogic is the complex detection logic involved in creating behavioral patterns, which yield high-fidelity alerts. Additionally, losing the control over Splunk SPL queries, due to lack of version control provided by Anvilogic, would pose a nightmare for any detection engineering team.
The deployment model for Anvilogic was private.
What is most valuable?
The best features of Anvilogic include easy usability for beginner analysts, good version control, though it could be enhanced, and the need for improved access controls and better training notifications for users. The quick responses regarding new threats and the thorough curation of detection rules were also positives. However, hiring customization based on customer environments and reducing noise from detections is critical.
I was surprised by the effective version control capabilities and how easily one can configure complex behavioral patterns. The learning curve is not steep, allowing even those with basic knowledge in writing detection rules to adapt quickly. However, after a year, I noticed limitations, especially concerning issue resolution timeframes.
What needs improvement?
My experience with Anvilogic is still in detection engineering, but writing detection logic in scripting languages, like the Splunk processing language, has limitations compared to programming languages. Anvilogic does provide some flexibility but has limitations when baseline detection rules or complex behavioral patterns are involved. I found it very efficient for version control with Splunk, although it lacked a robust CI/CD pipeline, which is crucial for comprehensive testing before changes go into production. The API documentation was also limited, affecting data analytics capabilities regarding detection logic. Nonetheless, Anvilogic's support team was responsive and provided good support when I raised issues.
One suggestion I have for Anvilogic is improving the whitelisting process, as maintaining a CSV for that can become cumbersome when it reaches 10,000 lines. Additionally, the separation for customer-specific detection rules and suppressions could be better defined so the changes can be made without needing customer support every time.
I was informed about the AI SOC solutions Anvilogic was working on; however, they were not functional at the time, and I cannot comment on their effectiveness since I lacked access to those features. The version controlling and behavioral patterns are strong suits of Anvilogic, but there needs to be stronger access control and CI/CD pipeline integration. Additionally, customer support could be more prompt, and custom detections should be tailored more effectively.
For how long have I used the solution?
It has been almost eight months since I last worked with Anvilogic because I switched companies, so I have not worked with it since.
What do I think about the stability of the solution?
I generally handle scalability through Splunk admin team support, and I did not face significant downtime or reliability issues with Anvilogic. It felt stable and sufficiently reliable throughout my time using it.
What do I think about the scalability of the solution?
In 12 months, I do not believe Anvilogic will be replaced since it is deeply integrated into the detection framework at Rakuten, and the time taken to stabilize integrations is considerable. Even with its shortcomings, the value Anvilogic brings in detection and threat investigation is hard to replicate quickly.
Anvilogic will not be replaced at Rakuten, as its integration is extensive, and the time to build stable detection solutions is significant. Even small companies face challenges transitioning expertise, which makes Anvilogic a viable long-term solution.
How are customer service and support?
The rating for the technical support of Anvilogic would depend on factors like who handles the request, but on a scale of 1 to 10, I would rate it around 6.5 to 7. Requests are typically addressed within 45 to 60 days, which I consider a reasonable timeframe given the number of customers.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Anvilogic was introduced at my last company before I joined the detection engineering team, and I know it is mainly used by that team. I am unsure if they have switched back to any other MSSP or whether they have switched back from Anvilogic to any other product.
How was the initial setup?
The deployment process took place before my arrival at the company.
Which other solutions did I evaluate?
Based on the context of the environment, I find Anvilogic is highly beneficial for smaller cybersecurity teams needing an efficient detection tool. Larger organizations may explore alternatives, but for small to intermediate teams, Anvilogic fits well in their detection processes.
What other advice do I have?
Regarding triage, I usually perform analysis directly through Splunk, so I do not find Anvilogic enhances my triaging process significantly. However, it does provide useful triggered rules, but Splunk remains my primary tool for queries and triage.
My overall review rating for Anvilogic is 6.5 out of 10.