Throughput at regulated scale
Two decades of operational depth at 500K to 5M events per second. Programs that ingest at that volume find cloud SIEM pricing punishing.
OpenText • Security operations
Enterprise Security Manager is the on-prem ArcSight ESM flagship for high-throughput regulated SIEM where cloud is not an option. Two decades of operational depth in financial services, government, defense, and healthcare make it the platform of record for regulated SOC environments.
Through Merito, ESM runs as the on-prem flagship for regulated SOCs that cannot adopt cloud SIEM, with infrastructure design, ArcSight content modernization, scale-out planning, and OpenText SecOps line integration handled as long-term operational work rather than one-time deployment.
What it is
OpenText Enterprise Security Manager is ArcSight ESM rebranded. ESM has been the on-prem flagship SIEM for high-throughput regulated environments for two decades, with deployments in financial services, government, defense, and healthcare that handle log volumes other SIEMs cannot economically ingest. Merito's pitch is honest: programs that can run cloud SIEM should evaluate Core Threat Detection and Response or Splunk Cloud; programs that cannot, because of regulatory, sovereignty, or volume constraints, run ESM as the right answer for as long as those constraints hold.
Throughput at scale is the historical strength. Programs that ingest 500,000 to 5,000,000 events per second find that cloud-SIEM pricing models become punishing while ESM stays linear. Combined with the regulated content library and the on-prem operational shape required by some sovereign-cloud and air-gapped programs, ESM remains the operational fit. The 2024-2025 rebrand from ArcSight ESM to OpenText Enterprise Security Manager is cosmetic at the engine level.
Cross-product integration with the OpenText SecOps line is the platform claim. ESM integrates with Network Detection and Response, Core Behavioral Signals (Interset UEBA), Core Adversary Signals (MITRE), Threat Intelligence, and Security Log Analytics. Programs running ESM with the rest of the line get unified SOC operations on-prem the way Core TDR delivers them in SaaS.
What breaks ESM adoption is operational scope creep. ESM is operationally substantial: content tuning, parser maintenance, scale-out architecture, and SOC operating-model design all require discipline. Programs that adopt ESM without operational headcount or partner support find the platform underused. Merito's engagement designs the operating model alongside the deployment, and Managed Services run ESM long-term for programs that want OpenText engineering without internal headcount.
Ideal use cases
What it is best at
Two decades of operational depth at 500K to 5M events per second. Programs that ingest at that volume find cloud SIEM pricing punishing.
Air-gapped, sovereign-cloud, and regulated workloads where SaaS SIEM is not an option. ESM is the platform of record.
Two decades of regulated SOC content covering insider threat, account compromise, lateral movement, data exfiltration, credential misuse.
Native correlation with NDR, Core Behavioral Signals (UEBA), Core Adversary Signals (MITRE), Threat Intelligence, and Security Log Analytics on-prem.
Programs ready to leave on-prem migrate to Core Threat Detection and Response in SaaS. Same content lineage; different deployment shape.
Core capabilities
Where ESM does the work cloud SIEM cannot economically do.
High-volume log ingestion
500K to 5M+ events per second on production deployments. Linear pricing at scale.
ArcSight detection content
Two decades of regulated SOC content covering insider threat, account compromise, lateral movement, data exfiltration, and credential misuse.
Custom rule and correlation authoring
Custom detection rules, correlation logic, and content modernization workflows.
Long-retention SIEM analytics
Hot SIEM with handoff to Security Log Analytics for long-retention forensic analytics.
Beyond detection into actual SOC operations.
Investigation workflow
Case management, evidence linking, and analyst assignment workflow.
Response automation
SOAR-shaped response with playbooks and integration into operational systems.
Cross-product enrichment
NDR signal, UEBA scoring, threat intel, and forensic context attached to investigations.
Regulated and sovereign environments where SaaS is ruled out.
Air-gapped deployment
Fully on-prem deployment without external dependencies for sovereign-cloud and air-gapped programs.
FIPS-compliant cryptography
FIPS 140-2/3 cryptographic modules for federal and regulated programs.
Compliance reporting
Audit-ready evidence for SOC 2, FedRAMP, HIPAA, PCI DSS, and ISO 27001.
Modernization path
Path to Core Threat Detection and Response in SaaS when regulatory constraints relax.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Enterprise Security Manager
On-prem flagship SIEM for high-throughput regulated environments.
Best for: Programs that cannot adopt cloud SIEM due to regulatory, sovereignty, or volume constraints.
Enterprise Security Manager government and federal editions
Hardened editions for federal and sovereign-cloud deployments with FIPS-compliant cryptography.
Best for: Federal and government programs requiring air-gapped or sovereign-cloud SIEM.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Infrastructure design, deployment, content modernization, scale-out planning, operating-model design.
Explore service02ArcSight ESM version upgrades and content modernization.
Explore service03SOC program scoping for ESM alongside Core Threat Detection and Response, Splunk Enterprise, and IBM QRadar.
Explore service04Content engineering, response automation, and cross-product on-prem SecOps integration.
Explore service05Named engineer, priority SLAs, and release-time coverage for ESM.
Explore service06Long-term partner-managed run for programs that want OpenText engineering without internal headcount.
Explore service07Role-based training for SOC analysts, content engineers, and SecOps architects.
Explore service08Merito-placed SOC engineers and OpenText specialists embedded on long-running programs.
Explore serviceOpenText Enterprise Security Manager licensing
ESM pricing arrives with infrastructure design, deployment, content modernization, scale-out planning, and operating-model design that keep high-throughput regulated SIEM running as a sustained SOC capability rather than a one-time install.
Merito point of view
Merito has scoped SOC programs where Enterprise Security Manager is exactly the right answer (high-throughput regulated environments where cloud is not an option, sovereign-cloud and air-gapped programs, regulated programs with volume constraints that make cloud SIEM economically punishing) and others where the program is ready to modernize to Core Threat Detection and Response. Both decisions are valid; the right one depends on the regulatory and volume constraints actually in effect.
Merito recommends ESM specifically when constraints rule out SaaS SIEM. For programs without those constraints, the modernization path to Core TDR is usually the right move. For programs picking specialist on-prem SIEM, Splunk Enterprise and IBM QRadar are competitive depending on the program shape. Merito surfaces those alternatives honestly during scoping.
Operational discipline is the binding constraint on ESM. The platform is technically deep and operationally substantial: content engineering, parser maintenance, scale-out architecture, and SOC operating-model design all require sustained investment. Programs that adopt ESM without operational headcount or partner support find the platform underused. Merito designs the operating model alongside the deployment.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your regulated SOC posture, log volume, and operating-model preferences. A Merito OpenText specialist follows up within one business day.
Throughput at scale
500K to 5M events per second on production deployments. Linear pricing where cloud SIEM becomes punishing.
Regulated and sovereign
Air-gapped, sovereign-cloud, and regulated workloads. ESM is the platform of record where cloud is ruled out.
Next step
A Merito ESM engagement scopes the on-prem operating model alongside the deployment. Programs that adopt ESM without sustained operational discipline find the platform underused.