Try our new research platform with insights from 80,000+ expert users

Coralogix vs Elastic Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 18, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Coralogix
Ranking in Log Management
20th
Ranking in Security Information and Event Management (SIEM)
20th
Average Rating
8.4
Reviews Sentiment
6.6
Number of Reviews
14
Ranking in other categories
Application Performance Monitoring (APM) and Observability (21st), API Management (14th), Streaming Analytics (15th), Anomaly Detection Tools (2nd), AI Observability (14th)
Elastic Security
Ranking in Log Management
9th
Ranking in Security Information and Event Management (SIEM)
5th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
66
Ranking in other categories
Endpoint Detection and Response (EDR) (15th), Security Orchestration Automation and Response (SOAR) (7th), Extended Detection and Response (XDR) (8th)
 

Mindshare comparison

As of March 2026, in the Log Management category, the mindshare of Coralogix is 1.2%, up from 0.7% compared to the previous year. The mindshare of Elastic Security is 3.0%, down from 3.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management Mindshare Distribution
ProductMindshare (%)
Elastic Security3.0%
Coralogix1.2%
Other95.8%
Log Management
 

Featured Reviews

Naveenkumar Lakshman - PeerSpot reviewer
Presales Engineer at Crayon AS
Centralized monitoring has improved real-time issue tracking and reduced root cause analysis time
One of the best features that Coralogix offers is that it is integration friendly. I can seamlessly work with different cloud providers including AWS, Azure, and GCP. I can monitor Kubernetes or Docker platforms as well, and I can integrate with the DevOps chain including Jenkins and all infrastructure code, Terraform, or Ansible. Coralogix has positively impacted my organization by providing a centralized console to monitor the dashboard, giving me rich flexibility to see different sorts of data that is spread across the logs, metrics, or traces, which are the typical pillars of the observability tool. I have the interface where I can use the drag-and-drop feature, and I can create different types of charts. Mainly, I have the line charts and time series ones that I generally use in many use cases, gauges, tables, pie charts, or markdown widgets. These are the ones generically available, and I can switch between the visualization types. I am getting the underlying query in that and can import and export dashboards built upon the JSON format. I can have my own APIs integrated with my dashboards as well, such as with Terraform, which is useful for scaling across my environments. Regarding root cause analysis, mainly what I can do is correlate across all of the layers because the main logs that I work on are storage-related, including CIFS, NFS, SAN traffic, and the metrics including storage, throughput, or VM resource usage. Being able to view logs, metrics, or traces available, I get all of these in one place, and I can do root cause analysis much quicker.
Laurentiu Popescu - PeerSpot reviewer
Chief Product Officer at ClusterPower
Has improved threat detection with deep log analysis and streamlined investigation workflows
The most useful features I find in Elastic Security are the forensic ones that allow us to carry deeper analysis into the logs for in-depth investigations, and the dashboards, with the reporting dashboard being quite user-friendly. Elastic Security is quite good at identifying threats, as it is part of the deep investigation tool that I mentioned before. Unless we need to look further into a certain log, we can carry out a deeper analysis and forensics on those particular logs. I can assess the impact of Elastic Security's real-time data analysis on our threat response efficiency as working pretty good. We are looking for real-time analysis because we have a continuous inflow of logs from different sources: from our cloud, from Active Directory, from our network. So it works pretty well.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup is straightforward."
"After implementing Coralogix, I noticed specific outcomes and improvements; whenever we try to fetch the data or check the monitoring logs, the spikes, the bars, and the graphs open very quickly, the latency is really very low, and it opens everything very fast, which makes a good impact on our organization."
"The overall stability and reliability of Coralogix are excellent, and I rarely encounter issues."
"The best feature of this solution allows us to correlate logs, metrics and traces."
"Coralogix scales well, and I will rate it nine out of ten."
"Coralogix has positively impacted my organization by providing a centralized console to monitor the dashboard, giving me rich flexibility to see different sorts of data that is spread across the logs, metrics, or traces, which are the typical pillars of the observability tool."
"The solution is easy to use and to start with."
"Numerous data monitoring tools are available, but Coralogix somehow fine-tunes our policies and effectively supports our teams."
"It is an extremely stable solution. Stability-wise, I rate the solution a ten out of ten."
"Elastic Security is a highly flexible platform that can be implemented anywhere."
"The solution has a good community surrounding it for lots of helpful documentation for troubleshooting purposes."
"The most valuable features of Elastic Security are it is open-source and provides a high level of security."
"We like Elastic Security because it's a REST API-based solution. That's the primary reason we use it."
"The most valuable feature is the ability to collect authentication information from service providers."
"The most valuable features of the solution are the prevention methods and the incident alerts."
"The most valuable feature of Elastic Security is that you can install agents, and they are not separately licensed."
 

Cons

"I think Coralogix can be improved by setting up some AI type of tool inside it which can help new users."
"It would be helpful if Coralogix could integrate the main modules that any organization requires into a single subscription."
"Coralogix should have some AI capabilities to auto-detect anomalies and provide suggestions."
"The user interface could be more intuitive and explanatory."
"The documentation of the tool could be improved"
"Maybe they could make it more user-friendly."
"Coralogix's dashboard and search capabilities do not help me in any particular way."
"The features we were missing in the past were related to the way we see our metrics and aggregate our data."
"We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."
"Continuous upgrades can be quite inconvenient. My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently."
"The solution needs to be more reactive to investigations. We need to be able to detect and prevent any attacks before it can damage our infrastructure. Currently, this solution doesn't offer that."
"Email notification should be done the same way as Logentries does it."
"The solution's basic setup takes time, and a lot of effort is required from the beginning to make it actually work."
"The tool needs to integrate with legacy servers. Big companies can have legacy servers that may not always be updated."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"The price of this product could be improved, especially the additional costs. I would also like to see better-quality graphics."
 

Pricing and Cost Advice

"Currently, we are at a very minimal cost, which is around $400 per month since we have reduced our usage. Initially, we were at $900 per month."
"We are paying roughly $5,000 a month."
"The platform has a reasonable cost. I rate the pricing a three out of ten."
"The cost of the solution is per volume of data ingested."
"I find it better than Splunk in terms of cost-effectiveness. For cost-effectiveness, I would rate it a nine out of 10."
"It's a monthly cost with Elastic SIEM, but I am not sure of the exact cost."
"The tool's pricing is flexible and comes at unit cost. You don't have to pay for everything."
"The licensing cost of Elastic Security is based on the daily ingestion rate. I can't recall the exact figure, but for 10GB of log action daily, it would cost around $20,000."
"The price is reasonable. It probably costs the same as ArcSight and LogRhythm SIEM. FortiSIEM might cost less than Elastic Security. There are no hidden or additional costs."
"We are using the free, open-source version of this solution."
"The pricing is in the middle. I think it is not an expensive experience if we compare it with big names, for example, QRadar, and also Oxide. I think Elastic Security is quite cheap. I would rate the pricing of this solution a five out of ten."
"This is an open-source product, so there are no costs."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
10%
Computer Software Company
10%
Manufacturing Company
8%
Comms Service Provider
7%
Computer Software Company
10%
Government
9%
Comms Service Provider
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise2
Large Enterprise6
By reviewers
Company SizeCount
Small Business40
Midsize Enterprise11
Large Enterprise15
 

Questions from the Community

What do you like most about Coralogix?
Numerous data monitoring tools are available, but Coralogix somehow fine-tunes our policies and effectively supports our teams.
What is your experience regarding pricing and costs for Coralogix?
I am not aware of the pricing, setup cost, and licensing for Coralogix, as this comes under the business analyst, marketing team, and pre-sales team. I am from the technical line.
What needs improvement with Coralogix?
I think Coralogix can be improved by setting up some AI type of tool inside it which can help new users. Whenever they face any kind of issue or troubleshooting problem, I know that they already sh...
Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
I am satisfied with the pricing, setup cost, and licensing cost. It is a pure 10.
 

Also Known As

No data available
Elastic SIEM, ELK Logstash
 

Overview

 

Sample Customers

Payoneer, AGS, Monday.com, Capgemini
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Find out what your peers are saying about Coralogix vs. Elastic Security and other solutions. Updated: March 2026.
884,873 professionals have used our research since 2012.