

Logz.io and Wazuh are competitors in cloud-based security monitoring and analytics, with Logz.io being more favored for its simplicity and user-friendly design. Wazuh is preferred by those looking for comprehensive security features.
Features: Logz.io offers seamless integrations, insightful analytics, and user-friendly dashboards. Wazuh is recognized for its intrusion detection, compliance auditing, and advanced security capabilities.
Room for Improvement: Logz.io could expand its security features and improve customization options. It might also enhance its documentation for advanced integrations. Wazuh could improve its user interface and simplify its deployment processes. Enhancing community support for novices and streamlining learning resources could also be beneficial.
Ease of Deployment and Customer Service: Logz.io boasts a straightforward deployment and responsive customer service, minimizing technical overhead. In contrast, Wazuh's open-source nature introduces a steeper learning curve, but it compensates with detailed documentation and strong community support.
Pricing and ROI: Logz.io's subscription-based pricing provides predictable costs and quick ROI due to efficient setup. Wazuh, being open-source, offers lower initial costs but may require more resources for deployment, potentially affecting ROI in the short term.
I have seen value in security cost savings with Wazuh, as using proprietary EDR versions could save us substantial money.
They responded quickly, which was crucial as I was on a time constraint.
We use the open-source version of Wazuh, which does not provide paid support.
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
Currently, I don't see any limitations in terms of scalability as Wazuh can still connect many endpoints.
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate.
The stability of Wazuh is strong, with no issues stemming from the solution itself.
The stability of Wazuh is largely dependent on maintenance.
The indexer frequently times out, requiring system restarts.
Machine learning is needed along with understanding user behavior and behavioral patterns.
The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub.
I think Wazuh should improve by introducing AI functionalities, as it would be beneficial to see AI incorporated in the threat hunting and detection functionalities.
Wazuh is completely free of charge.
I would definitely recommend Wazuh, especially considering Fortinet's licensing model which is confusing and overpriced in my opinion.
Totaling around two lakh Indian rupees per month.
Wazuh is a SIEM tool that is highly customizable and versatile.
The system allows us to monitor endpoints effectively and collect security data that can be utilized across other platforms such as SOAR.
With this open source tool, organizations can establish their own customized setup.
| Product | Mindshare (%) |
|---|---|
| Wazuh | 4.6% |
| Logz.io | 0.8% |
| Other | 94.6% |

| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 7 |
| Company Size | Count |
|---|---|
| Small Business | 27 |
| Midsize Enterprise | 15 |
| Large Enterprise | 8 |
Logz.io provides a robust platform designed to streamline log monitoring, offering features like real-time dashboards and AI Insights. It ensures efficient management of environments such as Kubernetes, enhancing operational effectiveness and cost management.
Logz.io is built on an open-source foundation, facilitating quick setup and adaptability for users. Its real-time dashboards are accessible across multiple sub-accounts, allowing seamless scaling and integration into existing services. Log Patterns and Drop Filters improve log clarity by reducing noise, while Kibana visualizations enhance data analysis. Logz.io also supports simultaneous views of metrics and logs, optimizing Kubernetes management and improving logging efficiency. Continuous enhancements in access control, API performance, and documentation are areas for development. Improving AI capabilities and offering better data retention and update management are key focuses for future upgrades.
What are the key features of Logz.io?Logz.io is widely used in industries for log collection, monitoring, and aggregation in environments including cloud and AWS. It's leveraged for monitoring application health, security compliance, live game observability, and server performance. Organizations utilize archived logs for issue resolution and leverage dashboards to monitor microservices, ensuring system stability in development and production environments.
Wazuh offers an open-source platform designed for seamless integration into diverse environments, making it ideal for enhancing security infrastructure. Its features include log monitoring, compliance support, and real-time threat detection, providing effective cybersecurity management.
Wazuh stands out for its ability to integrate easily with Kubernetes, cloud-native infrastructures, and various SIEM platforms like ELK. It features robust MITRE ATT&CK correlation, comprehensive log monitoring capabilities, and detailed reporting dashboards. Users benefit from its file integrity monitoring and endpoint detection and response (EDR) capabilities, which streamline compliance and vulnerability assessments. While appreciated for its customization and easy deployment, room for improvement exists in scalability, particularly in the free version, and in areas such as threat intelligence integration, cloud integration, and container security. The platform is acknowledged for its strong documentation and technical support.
What are the key features of Wazuh?In industries like finance, healthcare, and technology, Wazuh is utilized for its capabilities in log aggregation, threat detection, and vulnerability management. Companies often implement its features to ensure compliance with stringent regulations and to enhance security practices across cloud environments. By leveraging its integration capabilities, organizations can achieve unified security management, ensuring comprehensive protection of their digital assets.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.