

Fidelis Elevate and Wazuh are prominent players in the cybersecurity field. Fidelis appears to have an edge with its advanced AI and automation capabilities, while Wazuh stands out for its robust threat detection and open-source appeal, making each suitable for different needs.
Features: Fidelis Elevate excels in advanced threat hunting, data loss prevention, and powerful network detection and response capabilities, driven by impressive automation and AI. On the other hand, Wazuh is built around threat detection, offering strong log analysis, SIEM integration, and effective vulnerability detection, leveraging its open-source nature.
Room for Improvement: Fidelis could enhance its open-source support and documentation to broaden community engagement. There is potential to expand its integration with third-party platforms and increase flexibility in deployment scalability. Wazuh needs improvement in its customer support services and user-friendly interfaces to minimize complexity. Deployment processes could be simplified, and professional support options should be more accessible.
Ease of Deployment and Customer Service: Fidelis offers streamlined deployment enhanced by solid support services, providing a more structured setup experience. Wazuh's deployment can be challenging due to its open-source model but benefits from active community-driven support, though relying more on community resources can be demanding for users with less technical expertise.
Pricing and ROI: Fidelis involves higher upfront costs with promising ROI through comprehensive features, particularly in automation and security. Wazuh offers a cost-effective solution with minimal initial expenses, thanks to its open-source model, delivering a strong ROI, especially for entities seeking flexibility and scalability. Organizations with budget constraints may find Wazuh appealing, while those prioritizing extensive security might favor Fidelis.
I have seen value in security cost savings with Wazuh, as using proprietary EDR versions could save us substantial money.
They responded quickly, which was crucial as I was on a time constraint.
We use the open-source version of Wazuh, which does not provide paid support.
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
Currently, I don't see any limitations in terms of scalability as Wazuh can still connect many endpoints.
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate.
The stability of Wazuh is strong, with no issues stemming from the solution itself.
The stability of Wazuh is largely dependent on maintenance.
The indexer frequently times out, requiring system restarts.
Machine learning is needed along with understanding user behavior and behavioral patterns.
The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub.
I think Wazuh should improve by introducing AI functionalities, as it would be beneficial to see AI incorporated in the threat hunting and detection functionalities.
Wazuh is completely free of charge.
I would definitely recommend Wazuh, especially considering Fortinet's licensing model which is confusing and overpriced in my opinion.
Totaling around two lakh Indian rupees per month.
Wazuh is a SIEM tool that is highly customizable and versatile.
The system allows us to monitor endpoints effectively and collect security data that can be utilized across other platforms such as SOAR.
With this open source tool, organizations can establish their own customized setup.
| Product | Market Share (%) |
|---|---|
| Wazuh | 7.9% |
| Fidelis Elevate | 1.1% |
| Other | 91.0% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Large Enterprise | 2 |
| Company Size | Count |
|---|---|
| Small Business | 27 |
| Midsize Enterprise | 15 |
| Large Enterprise | 8 |
Fidelis Elevate integrates network visibility, data loss prevention, deception, and endpoint detection and response into one unified solution. Now your security team can focus on the most urgent threats and protect sensitive data rather than spending time validating and triaging thousands of alerts.
Wazuh offers an open-source platform designed for seamless integration into diverse environments, making it ideal for enhancing security infrastructure. Its features include log monitoring, compliance support, and real-time threat detection, providing effective cybersecurity management.
Wazuh stands out for its ability to integrate easily with Kubernetes, cloud-native infrastructures, and various SIEM platforms like ELK. It features robust MITRE ATT&CK correlation, comprehensive log monitoring capabilities, and detailed reporting dashboards. Users benefit from its file integrity monitoring and endpoint detection and response (EDR) capabilities, which streamline compliance and vulnerability assessments. While appreciated for its customization and easy deployment, room for improvement exists in scalability, particularly in the free version, and in areas such as threat intelligence integration, cloud integration, and container security. The platform is acknowledged for its strong documentation and technical support.
What are the key features of Wazuh?In industries like finance, healthcare, and technology, Wazuh is utilized for its capabilities in log aggregation, threat detection, and vulnerability management. Companies often implement its features to ensure compliance with stringent regulations and to enhance security practices across cloud environments. By leveraging its integration capabilities, organizations can achieve unified security management, ensuring comprehensive protection of their digital assets.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.