Listing Thumbnail

    Anvilogic Core Detect

     Info
    Sold by: Anvilogic 
    Detection engineering teams love using Anvilogic's Multi-SIEM Detection Platform to quickly close detection gaps and reduce costs.
    4.4

    Overview

    Play video

    Anvilogic breaks the SIEM lock-in that drives detection gaps and high costs for enterprise SOCs. It enables detection engineers and threat hunters to keep using their existing SIEM while seamlessly adopting a scalable and cost-effective data lake for high-volume data sources and advanced analytics use cases. By eliminating the need for rip-and-replace, Anvilogic allows security leaders to confidently join the rest of the enterprise on the modern data stack without disrupting existing processes. Security operations teams at banks, airlines, and large tech companies use Anvilogic's modular detection engine, thousands of curated threat scenarios, and AI security copilot to improve detection coverage and save millions of dollars. Private offer only. Offered plans are by an organization's employee count, and offer can also include Copilot, Insights and/or Unified Detect add-ons.

    Highlights

    • Leverage thousands of ready-to-deploy detections across multiple query languages (SPL, SQL, KQL) with new detections released weekly by the Anvilogic Forge Team.
    • AI-Powered recommendations for automated tuning, maintenance and health insights
    • Customize and scope your most relevant MITRE ATT&CK techniques

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Anvilogic Core Detect

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (7)

     Info
    Dimension
    Description
    Cost/12 months
    Anvilogic Core Detect 2k Employees
    Anvilogic Core Detect: Up to 3 seats
    $80,000.00
    Anvilogic Core Detect 5k Employees
    Anvilogic Core Detect: Up to 10 seats
    $185,000.00
    Anvilogic Core Detect 20k Employees
    Anvilogic Core Detect: Up to 20 seats
    $310,000.00
    Anvilogic Core Detect 100k Employees
    Anvilogic Core Detect: Up to 30 seats
    $575,000.00
    Anvilogic Core Detect Additional Seat (qty 1)
    Anvilogic Core Detect: Additional Seat
    $3,000.00
    Anvilogic Core Detect Additional Employees (qty 100)
    Anvilogic Core Detect: Additional Employees
    $1.00
    Anvilogic Copilot Additional Questions (qty 1)
    Additional questions, only applicable to Copilot purchase.
    $1.00

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Anomaly Detection-Structured
    Top
    10
    In Generative AI, Security Observability

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    3 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Multi-SIEM Compatibility
    Support for multiple query languages including SPL, SQL, and KQL enabling detection deployment across different SIEM platforms without rip-and-replace migration
    Pre-built Detection Library
    Thousands of curated threat scenarios and ready-to-deploy detections with weekly updates from the detection engineering team
    AI-Powered Detection Optimization
    Automated tuning, maintenance, and health insights powered by AI recommendations for detection rules and security operations
    MITRE ATT&CK Framework Integration
    Ability to customize and scope detection rules aligned with specific MITRE ATT&CK techniques for targeted threat coverage
    Modular Detection Engine
    Scalable detection architecture supporting high-volume data sources and advanced analytics use cases alongside existing SIEM infrastructure
    MITRE ATT&CK Framework Integration
    Continuous assessment and mapping of detection coverage against MITRE ATT&CK framework to measure depth of detection coverage across attack techniques and layers.
    Multi-SIEM Native Integration
    Native API integration with major SIEM and detection platforms including Splunk, Microsoft Sentinel, IBM QRadar, Google Chronicle, CrowdStrike LogScale, and Sumo Logic Log Analytics.
    Automated Detection Rule Customization
    Automatic generation of deployment-ready detection rules customized to organization's environment including log sources, field mappings, thresholds, exclusions, and naming conventions.
    Detection Rule Audit and Remediation
    Automated identification and remediation of broken, noisy, and missing detection rules with validation using historical SIEM data.
    Threat Intelligence Operationalization
    Conversion of TTP-level threat intelligence reports from commercial sources and open-source intelligence into actionable detection rules with deployment recommendations.
    AI-Powered Threat Detection and Response
    Real-time threat detection and automated response capabilities augmented by advanced AI and automation across endpoints, cloud workloads, and identity infrastructure.
    Cloud Workload Protection
    Runtime threat protection for Amazon EC2 instances, EKS clusters, and AWS Fargate with autonomous blocking of malware, ransomware, and fileless attacks.
    Extended Detection and Response
    Correlated view of full attack stories across endpoints, identities, and cloud workloads using patented Storyline technology to automatically correlate and contextually group related events.
    Identity Threat Detection and Response
    Continuous monitoring and protection against credential theft, privilege escalation, and lateral movement attacks across Active Directory and cloud identity providers including Entra ID, Okta, Ping, SecureAuth, and Duo.
    Generative AI Security Analysis
    Generative AI security analyst that automates threat hunting, provides incident summaries, and accelerates investigations through machine-speed analysis.

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    No security profile
    -
    -
    -
    -
    -

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.4
    11 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    73%
    27%
    0%
    0%
    0%
    2 AWS reviews
    |
    9 external reviews
    External reviews are from G2  and PeerSpot .
    Kevin Hernandez

    Platform has transformed incident triage and correlation while reducing detection costs

    Reviewed on Feb 03, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Anvilogic  is security incident event management. A quick specific example of how I use Anvilogic  for security incident event management is triaging or correlation of security events from multiple security platforms and log sources.

    What is most valuable?

    I currently utilize multiple of Anvilogic's AI features, both for fine-tuning and developing new content, as well as the threat intelligence feeds that it provides.

    In my opinion, the best features Anvilogic offers are the AI features, which are great, and their common language rule tuning and modeling is much simpler than those other vendors that require query building skills.

    The common language rule tuning and modeling have made things easier for my team because it is broken down into multiple smaller chunks rather than one large chunk of code. Multiple smaller, pre-processed data points are basically visible and editable in those smaller chunks without having to actually code at all.

    Anvilogic has impacted my organization positively because it is native for cloud-type infrastructures and they have a significant proactive approach to cost licensing. Rather than having to import all data, it actually sits on top of Snowflake , which reduces overall cost for data storage itself. Since implementing Anvilogic, our overall costs have been reduced.

    What needs improvement?

    Anvilogic can be improved further by maturing certain intelligence aspects outside of articles. This is an aspect that lacks in most SIEM  and secure analytics tools, but personally the framework or "barebone" is in Anvilogic, it just needs further maturing

    For how long have I used the solution?

    I have been using Anvilogic for six months.

    What do I think about the stability of the solution?

    Anvilogic is stable.

    What do I think about the scalability of the solution?

    Anvilogic's scalability is good and it scales properly.

    How are customer service and support?

    I have not directly worked with customer support since I am a manager, but I have not heard any complaints from my employees.

    How would you rate customer service and support?

    Negative

    Which solution did I use previously and why did I switch?

    I previously used top tier SIEM 's. I switched to Anvilogic because it looked overall better and proved to be a better fit for our type of architecture.

    What was our ROI?

    I have seen a return on investment in the form of time saved developing new content.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing was straightforward. They provide estimates because obviously every business is different, but they provided reasonable estimates that were fairly accurate based on other customers from a similar type of background or size.

    Which other solutions did I evaluate?

    Before choosing Anvilogic, I evaluated other options. including vendors in the top quadrant

    What other advice do I have?

    Anvilogic has changed how my team thinks about detection and data usage because it makes it easier to follow than other tool sets. Since a lot of the content is dynamic, you can follow the trail in the threat hunt perspective compared to other tools where you have to manually recreate a new query to investigate the action further.

    The moment that led me to choose Anvilogic was triggered because we normally evaluate vendors every so often to make sure we have a proper solution in place.

    My usage of Anvilogic has evolved since onboarding and it is a bit more mature now, which certainly does help.

    When other teams ask about Anvilogic, I tell them that it is fairly good.

    There has not been anything that has become easier to justify or explain to leadership since adopting Anvilogic.

    My advice to others looking into using Anvilogic is to conduct a test or proof of concept based on your actual future stance so that you feel the proper controls and everything is adequate to where you want to go.

    I am looking forward to seeing how the tool will evolve and grow, especially with the AI features. I would rate this product overall as a 9 out of 10.

    Joe Moore

    Detection engineering has become consistent and now coordinates multi-platform threat rules

    Reviewed on Jan 31, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Anvilogic  is coordinating and tracking indicators of compromise and detection rules. I use Anvilogic  for coordinating and tracking indicators of compromise or detection rules by feeding detection rules into Splunk, our Splunk environment, and these are turned into actionable alerts for our security operations center.

    How has it helped my organization?

    Anvilogic has positively impacted my organization by being a force multiplier for our security operations center and has allowed us to coordinate and distribute work more efficiently and provide consistency among the multiple SIEM  environments.

    I was able to create 90 detection scenarios in the first two weeks of using Anvilogic, which showcases how it improved efficiency and consistency for my team.

    What is most valuable?

    The best features Anvilogic offers are consistent recording and tracking of detection engine detection rules as they adapt over time to adversary's behaviors, and the ability to operate in multiple security SIEM  environments.

    Anvilogic works for my team by providing a single point of contact to put detection engineering rules that then get distributed to all of the various event management engines, as we have multiple SIEM environments in our company, including Microsoft Defender, Splunk, Elastic, and others.

    Anvilogic has changed how my team thinks about detection by allowing us to no longer apply the same configurations and correlation rules in multiple Splunk environments and can transparently search across multiple SIEMS platforms.

    What surprised me the most about Anvilogic once I started using it is the ease of creating and maintaining custom threat intel and threat scenarios.

    What needs improvement?

    Anvilogic can be improved with more support for cross-platform and native detection languages such as Sigma  and Yara rules.

    For how long have I used the solution?

    I have been using Anvilogic for about six months.

    What do I think about the stability of the solution?

    Anvilogic has been very stable and reliable.

    What do I think about the scalability of the solution?

    Anvilogic's scalability has been great as it has been able to scale and perform well, better than the available resources we have to throw at it, and we have not run into any issues with our analysts not being able to access Anvilogic and perform their activities efficiently.

    How are customer service and support?

    Anvilogic customer support has been very productive to work with.

    How would you rate customer service and support?

    What was our ROI?

    I have seen a return on investment in that Anvilogic has been more of a fundamental enablement technology than a return on investment, but it has definitely allowed us to move more quickly with integrating our corporate acquisitions as well as with our corporate colleagues who use other SIEM technologies.

    What other advice do I have?

    When other teams ask about Anvilogic, I tell them it makes detection engineering into a process rather than a one-time operation.

    I convinced my leadership to adopt Anvilogic by comparing it to the manual operations and the overhead of repeated detection engineering processes.

    My advice for others looking into using Anvilogic is to start with the configurations and detection rules that come prepackaged, and then reach out and create your own to expand your capabilities; once you start using this system, it becomes much easier and more efficient than manually maintaining detection rules.

    I provide this review with a rating of 10.

    reviewer2800338

    Modern threat detection has improved coverage and reduced costs but still needs better UX and flexibility

    Reviewed on Jan 30, 2026
    Review from a verified AWS customer

    What is our primary use case?

    Anvilogic  serves as our security analytics tool on top of our security data lake.

    In my day-to-day work, we perform detection engineering on Anvilogic , and we also use the Armory  to provide us with strong coverage from a MITRE perspective and security coverage over our logs to ensure that we can detect threats and respond to those threats efficiently and effectively.

    We pursued Anvilogic as a piece of the puzzle to replace Splunk, our legacy SIEM  platform, and it was a big part of being able to decouple the detection capabilities that Anvilogic offers from the data storage capabilities of a data lake, which is a big use case as well.

    Our data lake is run on top of AWS  using Snowflake .

    What is most valuable?

    One of the best features Anvilogic offers is the Armory , which is full of various different pre-built detections; that was a huge improvement from any kind of pre-built detections we had in Splunk and saved a lot of time to really increase our coverage capability. I also appreciate the normalization process for log sources, normalizing them to a consistent schema where those alerts automatically apply is a nice feature and gives us a very clear-cut way to handle lots of different log sources in a centralized manner, ensuring that we are doing threat detection on those log sources.

    The normalization process has enhanced our log monitoring maturity; previously in Splunk, we had SIEM  mapping set up for log sources, but it did not translate necessarily to immediate security value because there were not pre-built detections that leveraged that SIEM mapping. The ability for Anvilogic to have built-in curated detection logic that automatically applies once we normalize logs creates immediate maturity and value every time we normalize a log source. It gives us a target to identify if a log source should be normalized. If it should, we know the value and output from Anvilogic; if it should not, we can identify custom use cases and build custom logic in Anvilogic or hold onto those logs in our data lake without any detections running on them if it is more for compliance or incident response.

    Anvilogic plus Snowflake  has vastly improved our total cost of ownership for the SIEM platform; we went from a pretty expensive platform in Splunk that was not vertically scalable due to budget limitations to a platform now that is far more efficient per terabyte of data ingested and processed per day. The savings per terabyte of data being ingested and monitored for security threats was a pretty significant percentage, which was a huge advantage. We now have budgetary space to scale up our solution as needed as the business grows.

    We have had to make difficult decisions to not ingest certain logs in the past due to budgetary restrictions, but now we can take a more liberal approach in accepting most requests and ingesting those logs into our SIEM because the cost to do so is not a problem for the company and for our internal budgets, which is huge.

    What needs improvement?

    There is room for growth in the product platform; our detection engineers using Anvilogic every day encounter some frustrating UX experience issues where buttons are not logically placed, and workflows are not working as expected. There is also room for growth in integrating the platform with third parties, as we have encountered limitations in what can be executed via API and what is documented. We are a heavy automation integration team, so having this well documented is important for us. The enterprise capabilities within the platform also seem somewhat limited, as we run into limitations in managing detections at scale and making changes to those detections at scale. Especially at an enterprise level, if we need to add enrichment logic to every single detection deployed, it can be quite onerous; we had to develop custom scripts to manage that. Thus, enhancing enterprise-type features for managing the platform at scale rather than clicking through the GUI is important as we continue to grow. Additionally, the AI capabilities have been somewhat unstable and unintuitive to use, which is key for increasing adoption.

    One other thing is that the detection logic builder today is somewhat limited in flexibility regarding implementing detections, grouping detections together, and handling alerts when they fire. This might be partly due to our need to adjust to a different platform, but flexibility is key for any enterprise platform to meet our unique business requirements. Having the capability to build custom detection logic not tied to a specific structure would be helpful; although a lot can be done, it often requires working with our account team which is time-consuming and less intuitive.

    For how long have I used the solution?

    I have been working in my current field for a little under 10 years.

    What do I think about the stability of the solution?

    Generally, Anvilogic is stable, although we have experienced some usability issues; the biggest instability has been with the AI agent, which the team is not using fully due to inconsistent results. Aside from that, the platform itself is stable.

    What do I think about the scalability of the solution?

    Anvilogic's scalability is quite good; however, we require more and more detection capabilities, and there is a ceiling based on what the Armory offers or what our team can custom develop. I would love to see an increase in out-of-the-box detections curated by the team, which would be a significant value add. As for the platform technology being based on Snowflake, it has essentially unlimited scalability, so I have no concerns there.

    How are customer service and support?

    Customer support is great, particularly from our immediate contact, Brad, who is very engaged and responds quickly, dedicating time to answer questions and onboard us effectively. However, outside of him, the process can get vague, with requests sometimes disappearing and lacking a clear tracking system, but overall, the experience is generally positive with some expected challenges from a smaller team.

    Which solution did I use previously and why did I switch?

    We previously used Splunk and switched to Anvilogic + Snowflake.

    The moment we realized we needed something better was triggered by the lack of detection coverage and the overhead required to improve detection in Splunk, along with the non-scalable cost of operating it. We constantly dropped logs from monitoring, which is not the focus of a security organization; we wanted better coverage and monitoring, and that is what Anvilogic and Snowflake enabled us to achieve.

    How was the initial setup?

    Since onboarding, we started with rough, quick migrations of log sources and detections from Splunk to Anvilogic, but we have since cleaned up a lot of our normalization tasks and ensured things are correctly categorized, steadily deploying more Armory detections onto our existing data sets for better coverage.

    What was our ROI?

    While I do not have specific metrics, we have certainly seen a return on investment, mainly in time taken to improve detection coverage and the ability to detect threats on our logs. The Armory has greatly increased our coverage while reducing the time that would have been needed to develop detections ourselves in Splunk. However, the volume of alerts generated is shifting the cost to the operations side, requiring us to ensure that detections are tuned and alerts are efficiently firing to prevent noise that could increase costs for operations personnel and risk missing incidents.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing has been overall positive; the Anvilogic team has been very engaged throughout the process, which helped us adopt the platform. Weekly calls and a hands-on approach over the significant changes in how we do SIEM have been beneficial. Licensing is reasonably affordable and should be evaluated over time concerning the platform's value. Setup costs primarily involved internal work to configure our pipelines, but mostly consisted of man-hours.

    Which other solutions did I evaluate?

    We evaluated various options before choosing Anvilogic, including Gurucul, Panther  Security, and Splunk Cloud, among others. Ultimately, we found Anvilogic to be the best fit for our needs.

    What other advice do I have?

    Another feature we are excited about, but we have not seen the value in yet, is the AI capabilities for detection engineering; it is, in theory, going to be very powerful and really reduce our time to develop new detections. There are more agentic features coming on the roadmap that have not been released yet, and we have not been able to see the full picture of value of that aspect of the product yet, but in theory, those should be extremely beneficial and really magnifying the amount of detection engineering work our team can do.

    What surprised me the most about Anvilogic was the modern solution it offered to solving a SIEM business problem, which was different from other vendors. Anvilogic being a detection engineering tool makes sense and allows us to run it on any data lake background, which is unique. This decoupling of security detection from security data storage enabled us to pursue this path.

    If Anvilogic disappeared tomorrow, we would lose our detection capability, which would be significant and necessitate finding another vendor's solution.

    I rate Anvilogic about a seven on a scale of 1 to 10.

    I chose a seven because the platform is a huge improvement from our legacy SIEM platform in Splunk, especially from a detection perspective. However, there are certainly opportunities to improve the user experience and capabilities, as well as to mature the platform. These three aspects make a difference in execution and can improve competitive edge significantly.

    I convinced our leadership to adopt Anvilogic by emphasizing the cost benefits of increased capabilities at a lower cost. The Anvilogic-Snowflake combination presented a centralized source, which is advantageous for reusing security data across other non-SIEM use cases, making it an easy sell.

    My advice for others considering Anvilogic is that depending on your company's detection engineering needs and maturity with your legacy SIEM platform, Anvilogic can provide a swift, significant value add. If you have a dedicated SIEM team with many custom use cases built on a platform such as Splunk, Anvilogic may not be the correct fit. We were a small team managing a complex old system and were not getting the full value from Splunk. Anvilogic provided a more dynamic, low-overhead solution, making it a great fit for us, but for larger teams with custom detection needs, it might be less flexible.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    reviewer2799930

    Detection workflows have improved with strong version control but need better CI and access control

    Reviewed on Jan 28, 2026
    Review provided by PeerSpot

    What is our primary use case?

    I primarily use Anvilogic as a wrapper over SIM, mainly Splunk, but it can also be applied to other SIM platforms like Kibana. I utilize it for versioning the rules and detection logic I write, which can get stale or require enhancement. For example, if I wrote a detection rule for detecting script execution that needed additional logic, I used Anvilogic to maintain those versions or to build behavioral detection patterns, which is complicated in Splunk alone.

    Anvilogic allows me to extract a plethora of information, including mapping TTPs assigned for detection logic, which effectively helps in setting quarterly coverage agendas, thus illustrating its vital role in detection strategy and management presentations. The first thing that would break without Anvilogic is the complex detection logic involved in creating behavioral patterns, which yield high-fidelity alerts. Additionally, losing the control over Splunk SPL queries, due to lack of version control provided by Anvilogic, would pose a nightmare for any detection engineering team.

    The deployment model for Anvilogic was private.

    What is most valuable?

    The best features of Anvilogic include easy usability for beginner analysts, good version control, though it could be enhanced, and the need for improved access controls and better training notifications for users. The quick responses regarding new threats and the thorough curation of detection rules were also positives. However, hiring customization based on customer environments and reducing noise from detections is critical.

    I was surprised by the effective version control capabilities and how easily one can configure complex behavioral patterns. The learning curve is not steep, allowing even those with basic knowledge in writing detection rules to adapt quickly. However, after a year, I noticed limitations, especially concerning issue resolution timeframes.

    What needs improvement?

    My experience with Anvilogic is still in detection engineering, but writing detection logic in scripting languages, like the Splunk processing language, has limitations compared to programming languages. Anvilogic does provide some flexibility but has limitations when baseline detection rules or complex behavioral patterns are involved. I found it very efficient for version control with Splunk, although it lacked a robust CI/CD pipeline, which is crucial for comprehensive testing before changes go into production. The API documentation was also limited, affecting data analytics capabilities regarding detection logic. Nonetheless, Anvilogic's support team was responsive and provided good support when I raised issues.

    One suggestion I have for Anvilogic is improving the whitelisting process, as maintaining a CSV for that can become cumbersome when it reaches 10,000 lines. Additionally, the separation for customer-specific detection rules and suppressions could be better defined so the changes can be made without needing customer support every time.

    I was informed about the AI SOC solutions Anvilogic was working on; however, they were not functional at the time, and I cannot comment on their effectiveness since I lacked access to those features. The version controlling and behavioral patterns are strong suits of Anvilogic, but there needs to be stronger access control and CI/CD pipeline integration. Additionally, customer support could be more prompt, and custom detections should be tailored more effectively.

    For how long have I used the solution?

    It has been almost eight months since I last worked with Anvilogic because I switched companies, so I have not worked with it since.

    What do I think about the stability of the solution?

    I generally handle scalability through Splunk admin team support, and I did not face significant downtime or reliability issues with Anvilogic. It felt stable and sufficiently reliable throughout my time using it.

    What do I think about the scalability of the solution?

    In 12 months, I do not believe Anvilogic will be replaced since it is deeply integrated into the detection framework at Rakuten, and the time taken to stabilize integrations is considerable. Even with its shortcomings, the value Anvilogic brings in detection and threat investigation is hard to replicate quickly.

    Anvilogic will not be replaced at Rakuten, as its integration is extensive, and the time to build stable detection solutions is significant. Even small companies face challenges transitioning expertise, which makes Anvilogic a viable long-term solution.

    How are customer service and support?

    The rating for the technical support of Anvilogic would depend on factors like who handles the request, but on a scale of 1 to 10, I would rate it around 6.5 to 7. Requests are typically addressed within 45 to 60 days, which I consider a reasonable timeframe given the number of customers.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Anvilogic was introduced at my last company before I joined the detection engineering team, and I know it is mainly used by that team. I am unsure if they have switched back to any other MSSP or whether they have switched back from Anvilogic to any other product.

    How was the initial setup?

    The deployment process took place before my arrival at the company.

    Which other solutions did I evaluate?

    Based on the context of the environment, I find Anvilogic is highly beneficial for smaller cybersecurity teams needing an efficient detection tool. Larger organizations may explore alternatives, but for small to intermediate teams, Anvilogic fits well in their detection processes.

    What other advice do I have?

    Regarding triage, I usually perform analysis directly through Splunk, so I do not find Anvilogic enhances my triaging process significantly. However, it does provide useful triggered rules, but Splunk remains my primary tool for queries and triage.

    My overall review rating for Anvilogic is 6.5 out of 10.

    Jason Murphy

    Improves SOC response times and simplifies alert management through efficient customization

    Reviewed on Sep 10, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Anvilogic  is for triage in the SOC. That's the primary use case.

    What is most valuable?

    The 'we need something better' moment was triggered when we were trying to roll out custom alerts with Splunk Enterprise Security ; it was atrocious to do that. You would have to clone things and then reuse alerts you made. Just making new alerts, the process was not very good, and there was no versioning for all the alerts we create. So we had to trust Splunk for what they created. Rolling out new alerts was a pain since you had to load them up in a new app and things similar to that.

    With Anvilogic , they made it super simple. I can describe a process where they have something they refer to as the Armory . You just go to the Armory , click all the things you want. It automatically pushes it down to your Splunk Enterprise with their app loaded up on there if you modify it as needed. It tends to just work, and you can customize it easily since it tells you the Splunk language plus the normal human language. So it makes modifying it simple with rollback versioning. They have groups based on known attackers coming for you, and you can group them together that way and deploy a whole set of alerts designed just for those specific use cases of those attackers and their IOCs.

    Aside from the easy custom alerting with Anvilogic, the next feature I appreciate most is that they also standardized bringing in the logs. They set some macros that help standardize and make more sense than Splunk. They teach you and give you insights every morning or every week, saying, 'Hey, this is not working, so what do you want. You're getting one or two of these alerts per day. Do you want to squash them from error to warning?' They're always giving you tips on how to improve the efficiency of the system itself. Creating scenarios was amazing. In Anvilogic's case, you create scenarios based on MITRE ATT&CK framework. Every  rule that fits that MITRE will get used.

    My usage with Anvilogic has evolved since onboarding. After about two or three years, they started offering their cloud-based SOC where instead of just using Splunk as a data set, you could run your searches against Snowflake  databases, Demisto , and others including Azure  log storage. Their generative AI work has been fantastic as it's very specific in what you need to do. The route they've gone with the different types of AI agents aligns exactly with what I was hoping the market would do. Seeing them do the Tier Zero for SOC-type stuff with their playbooks has been impressive.

    Since adopting Anvilogic, our team's quick SOC response has become essential. We have been known to respond within five to seven minutes to an attacker compromising an account.

    What needs improvement?

    Anvilogic could be better in areas of the triage dashboard as they're beholden to Splunk's functionality. I need to click three times to get to all the information I need. Enterprise Security did that better in the old version. Anvilogic requires three clicks to get the full set of information. More customization on the triage dashboard would be beneficial, however, there have been no limitations so far.

    For how long have I used the solution?

    Anvilogic has been in use for just over three years.

    What do I think about the stability of the solution?

    Regarding stability and reliability of Anvilogic, I cannot recall an outage. There might be temporary issues with updates, yet they have a Slack chat where they respond really fast. I have never experienced a serious outage.

    What do I think about the scalability of the solution?

    Anvilogic grows effectively with the needs of my organization. They see where the market and technology are going, and they can institute all the things they wish they had when they were SOC operators.

    How are customer service and support?

    I would evaluate their customer and technical support as fantastic. Their support is excellent since they answer my questions. When I try to create new solutions within the scope, they work with me effectively.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I did not extensively consider alternatives before selecting Anvilogic. Enterprise Security was still the best SIEM  available since we were a Splunk shop. Through my reseller consortium networks, I received personal introductions to people at the founder level. Within 30 minutes of talking to Anvilogic, I realized they addressed all the problems I had been experiencing.

    How was the initial setup?

    I would describe my experience with deploying Anvilogic as simple.

    What was our ROI?

    I have seen a return on my investment with Anvilogic. We rolled out approximately 1,500 Armory alerts in three months, which would not have been possible with Splunk, and they were all fixed and modified as needed.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup costs, and licensing of Anvilogic was the easiest experience I have ever had.

    What other advice do I have?

    When other teams ask about Anvilogic, I tell them it is security only. There were no surprises about the Anvilogic solution once I started using it; they were honest from the beginning about what they do and where they are going. Their culture is fantastic, and the people care about what they are doing.

    The deployment model for Anvilogic is hybrid. We use Azure  for some machines and have a small AWS  footprint.

    I rate Anvilogic a 9 out of 10, as they work effectively and fix the problems that people have with other SOCs and SIEMs.

    View all reviews