

Elastic Security and Logz.io are competing products in the field of security and logging services. Elastic Security offers robust pricing and support options, while Logz.io stands out with its extensive features that users feel justify the cost.
Features: Elastic Security is praised for its powerful integration capabilities, flexible search functionality, and robust pricing. Logz.io is noted for its comprehensive monitoring features, seamless scalability, and advanced analytics.
Room for Improvement: Elastic Security users point to the need for better documentation, more intuitive configuration, and faster deployment. Logz.io users mention a desire for enhanced alerting mechanisms, quicker customer support responses, and cost optimization.
Ease of Deployment and Customer Service: Elastic Security is seen as complex to deploy but benefits from a strong customer service team. Logz.io offers a more straightforward deployment process, but users sometimes report delays in support response.
Pricing and ROI: Elastic Security offers competitive setup costs and is often viewed as delivering good ROI. Logz.io, while slightly more expensive upfront, is considered by users to provide substantial value over time due to its rich feature set.
It does not require hefty security budgets and can be deployed for enterprise security effectively.
Most of the time when my team encounters issues, they receive responses within 24 hours.
Support is prompt and helpful.
I have not faced any difficulties with Elastic Security, as we have a pretty good support service from them.
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
Elastic Security is quite scalable.
In terms of stability, I would rate Elastic a solid eight out of ten.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
Machine learning algorithms become better with time; as they ingest a huge volume of data, they become better.
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
Elastic Security is considered cost-effective, especially at lower EPS levels.
Elastic Security is as flexible and configurable as Microsoft Sentinel.
The platform provides more visibility and requires less effort in monitoring.
The most useful features I find in Elastic Security are the forensic ones that allow us to carry deeper analysis into the logs for in-depth investigations, and the dashboards, with the reporting dashboard being quite user-friendly.
| Product | Mindshare (%) |
|---|---|
| Elastic Security | 3.2% |
| Logz.io | 1.0% |
| Other | 95.8% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 11 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 7 |
Elastic Security stands out for its speed, scalability, and intuitive interface. It integrates seamlessly with Elasticsearch and Kibana, providing efficient data indexing, centralized log management, and intelligent threat identification, all while being open-source.
Elastic Security offers robust capabilities in security monitoring, threat identification, and SIEM functionalities. Its open-source nature enhances scalability, facilitating log aggregation and infrastructure monitoring. Users appreciate the intuitive dashboards and machine learning integration, which aid in proactive security measures and anomaly detection. Despite its strengths, improvements are needed in documentation, scalability, and configuration complexity. High data volume pricing and limited machine learning support are concerns, while dashboard enhancement and seamless integration with existing systems are desirable. The platform is widely used for alerting suspicious activities, analyzing logs from firewalls and Active Directory, and providing endpoint protection. It serves as a key tool for security awareness and auditing, integrating effectively with technologies like Kibana and OpenShift.
What are the most notable features of Elastic Security?Organizations deploy Elastic Security across industries for log aggregation and security monitoring, detecting unauthorized access, and analyzing system logs. It is essential for infrastructure monitoring and integrates effectively with systems such as Fluentd and OpenShift, supporting comprehensive security views across enterprise environments.
Logz.io provides a robust platform designed to streamline log monitoring, offering features like real-time dashboards and AI Insights. It ensures efficient management of environments such as Kubernetes, enhancing operational effectiveness and cost management.
Logz.io is built on an open-source foundation, facilitating quick setup and adaptability for users. Its real-time dashboards are accessible across multiple sub-accounts, allowing seamless scaling and integration into existing services. Log Patterns and Drop Filters improve log clarity by reducing noise, while Kibana visualizations enhance data analysis. Logz.io also supports simultaneous views of metrics and logs, optimizing Kubernetes management and improving logging efficiency. Continuous enhancements in access control, API performance, and documentation are areas for development. Improving AI capabilities and offering better data retention and update management are key focuses for future upgrades.
What are the key features of Logz.io?Logz.io is widely used in industries for log collection, monitoring, and aggregation in environments including cloud and AWS. It's leveraged for monitoring application health, security compliance, live game observability, and server performance. Organizations utilize archived logs for issue resolution and leverage dashboards to monitor microservices, ensuring system stability in development and production environments.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.