Cancel
You must select at least 2 products to compare!
Datadog Logo
24,253 views|14,438 comparisons
95% willing to recommend
Wazuh Logo
38,600 views|20,925 comparisons
75% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Jul 23, 2023

We performed a comparison between Datadog and Wazuh based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.

  • Features: Datadog users like its customizable displays, error tracking, and advanced AI/ML capabilities. Wazuh stands out for its effortless integration, excellent log monitoring capabilities, and ELK-based investigation. Datadog could enhance its usability and reduce its learning curve. Users said integration was another pain point. Wazuh needs improvements in event source coverage, threat intelligence integration, and real-time monitoring of Unix systems.

  • Service and Support: While many users spoke highly of Datadog’s support team, others reported slow support, especially in the Asia-Pacific region. Wazuh's customer service is generally deemed satisfactory, and many customers noted that they could easily find answers from community forums.

  • Ease of Deployment: Datadog’s setup is considered straightforward, and users often receive help from a partner or vendor. Some users said that Wazuh’s setup is easy and fast, while others perceived it as complicated and said it required a significant amount of time.

  • Pricing: Opinions about Datadog's price are divided. Some users found it costly, but others thought it was acceptable. Some said the pricing model could be clearer and better explained. Wazuh is a cost-effective option as it is open-source and completely free to acquire.

  • ROI: Users said Datadog saved them time and improved visibility into security blind spots. Wazuh's MSP program and partnerships offer opportunities to generate revenue from the platform.

Conclusion: Users find that Datadog's initial setup is easy and straightforward, while Wazuh's setup can be complex. Datadog offers valuable features such as dashboards, reporting, error reporting, and log centralization. It is also praised for its ease of use and setup, making it user-friendly for development teams. Additionally, Datadog's customer service and support are highly regarded for being helpful and responsive. On the other hand, Wazuh's support has mixed reviews and limitations. 
To learn more, read our detailed Datadog vs. Wazuh Report (Updated: April 2024).
769,662 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"I have found the logging and tracing features the most valuable.""By moving to Datadog, we did not need to manage our own monitoring infrastructure anymore.""It brings in observability, monitoring, and alerting capabilities - all of which we need to operate at scale.""The integration into AWS is key as well as our software is currently bound to AWS.""The tool's deployment is easy.""The RUM solution has improved our ability to triage faster and hand more capabilities to our customer support.""The tools are powerful and intuitive to set up.""Most of the features in the way Datadog does monitoring are commendable and that is the reason we choose it. We did some comparisons before picking Datadog. Datadog was recommended based on the features provided."

More Datadog Pros →

"Good for monitoring, active response, and for vulnerabilities.""It's very easy to integrate Wazuh with other environments, cloud applications, and on-prem applications. So, the advantage is that it's easy to implement and integrate with other solutions.""The configuration assessment and Pile integrity monitoring features are decent.""I like Wazuh because it is a lot like ELK, which I was already comfortable with, so I didn't have to learn from scratch.""If they support a solution, it is easy to do an integration.""I like the features we use, including malware detection, inventory, detection of hidden processes, and activity logs. Inventory is probably the most important feature. It tells us when processes and packages were installed and what they are, which is helpful.""We use it to find any aberration in our endpoint devices. For example, if someone installs a game on their company laptop, Wazuh will detect it and inform us of the unauthorized software or unintended use of the devices provided by the company.""The product is easy to customize."

More Wazuh Pros →

Cons
"The setup was a bit complex.""When the logs are too big, and Datadog splits them, the JSON format breaks and it is not so useful for us.""It can be overwhelming for new people as it has a lot of features.""The parallel editing of the dashboards should not cause users to lose the work of another person.""The sheer amount of products that are included can be overwhelming.""The logging could be improved in the future.""It would be ideal if the product offered a bit more monitoring from our dashboard.""​It would be nice to be able to graph metrics by excluding certain tags (like you can do in monitors)."

More Datadog Cons →

"It would be great if there could be customization for the decoder portion.""Wazuh needs more security and features, particularly visualization features and a health monitor.""I think that the next release should be more suitable for large enterprises, because currently they are not because large companies do not rely on open source solutions.""Scalability is a constraint in the on-prem version of Wazuh in terms of the volume of logs we can manage.""Wazuh doesn't cover sources of events as well as Splunk. You can integrate Splunk with many sources of events, but it's a painful process to take care of some sources of events with Wazuh.""They need to go towards integrating with more cloud applications and not just OS like Windows and Linux.""The biggest part that's missing is threat intelligence. It isn't inbuilt, and if a sudden incident occurs, we don't get that feedback inside the SIEM tool. That's a big gap, I see. It would be better if we could get the threat intelligence feeds integrated with the SIEM tools. That would help us push value solutions to the clients in a big way.""It would be better if they had a vulnerability assessment plug-in like the one AlienVault has. In the next release, I would like to have an app with an alerting mechanism."

More Wazuh Cons →

Pricing and Cost Advice
  • "​Pricing seems reasonable. It depends on the size of your organization, the size of your infrastructure, and what portion of your overall business costs go toward infrastructure."
  • "It has always scaled for us. Cost scales up too, but that is not necessarily a bad thing. It's reasonable for what they're providing."
  • "Pricing and licensing are reasonable for what they give you. You get the first five hosts free, which is fun to play around with. Then it's about four dollars a month per host, which is very affordable for what you get out of it. We have a lot of hosts that we put a lot of custom metrics into, and every host gives you an allowance for the number of custom metrics."
  • "At my last company, we did see ROI, specifically around response time. We could get to mission critical things that were down and losing revenue on immediately. So, the product paid itself back."
  • "The pricing and licensing through AWS Marketplace has been good. It would be nice if it was cheaper, but their pricing is reasonable for what it is. Sometimes, for their newer features, they charge as if it's fully fleshed out, even though it is a newer feature and it may have less stuff than their other items."
  • "It costs the same amount it would if we were hosting it ourselves, so we are incredibly happy with the cost."
  • "The pricing came up a bit compared to their competitors. It is not that the price has risen, but that the competitors have gone down. They keep adding more features that I would have expected to be baked in at a more nominal price. I have been increasingly dissatisfied with the pricing, but not enough to jump ship."
  • "It didn't scale well from the cost perspective. We had a custom package deal."
  • More Datadog Pricing and Cost Advice →

  • "Wazuh is open-source, so I think it's an option for a small organization that cannot go for enterprise-grade solutions like Splunk."
  • "There is not a license required for Wazuh."
  • "Wazuh is open-source, but you must consider the total cost of ownership. It may be free to acquire, but you spend a lot of time and effort supporting the product and getting it to a point where it's useful."
  • "Wazuh is open-source, therefore it is free. You can purchase support for $1,000 a year."
  • "Wazuh is totally free and open source. There are no licensing costs, only support costs if you need them."
  • "Wazuh has a community edition, and I was using that. It's free and open source."
  • "The current pricing is open source."
  • "Wazuh is free and open source."
  • More Wazuh Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    769,662 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:There are many factors and we know little about your requirements (size of org, technology stack, management systems, the scope of implementation). Our goal was to consolidate APM and infra… more »
    Top Answer:With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good core… more »
    Top Answer:Our organization ran comparison tests to determine whether the Datadog or Dynatrace network monitoring software was the better fit for us. We decided to go with Dynatrace. Dynatrace offers network… more »
    Top Answer:Integrates with various open-source and paid products, allowing for flexibility in customization based on use cases.
    Top Answer:I have built some rules that produce duplicate alerts two or three times. Therefore, these rules should be consolidated. Alerts should be specific rather than repeatedly triggered by integrating… more »
    Top Answer:We use Wazuh for the onboarding of both Windows and Linux machines, as well as for firewall and SIM configuration. The IP address is automatically blocked if a server has multiple wrong passwords.
    Ranking
    3rd
    out of 95 in Log Management
    Views
    24,253
    Comparisons
    14,438
    Reviews
    94
    Average Words per Review
    432
    Rating
    8.6
    2nd
    out of 95 in Log Management
    Views
    38,600
    Comparisons
    20,925
    Reviews
    31
    Average Words per Review
    479
    Rating
    7.6
    Comparisons
    Elastic Security logo
    Compared 16% of the time.
    Security Onion logo
    Compared 13% of the time.
    Splunk Enterprise Security logo
    Compared 11% of the time.
    AlienVault OSSIM logo
    Compared 10% of the time.
    Learn More
    Overview

    Datadog is a cloud monitoring solution that is designed to assist administrators, IT teams, and other members of an organization who are charged with keeping a close eye on their networks. Administrators can use Datadog to set real-time alerts and schedule automated report generation. They can deal with issues as they arise and keep up to date with the overall health of their network while still being able to focus on other tasks. Users can also track the historical performance of their networks and ensure that they operate at the highest possible level.

    Datadog Benefits

    Some of the ways that organizations can benefit by deploying Datadog include:

    • Gain an integrated view of the services and programs that IT teams are employing across their networks. Users can view and monitor all of the disparate programs that they have running across their networks with this one solution. They can track these programs across the entirety of the data’s life cycle.
    • Analyze and utilize massive amounts of data in real time. Datadog’s dashboards gather data in real time. Administrators can utilize their network’s data the minute that it becomes relevant to them. Decisions can be made based on the most current information available.
    • Keep your cloud network secured against digital threats. Datadog enables users to create alerts that will notify the minute that threats arise. IT teams and administrators can rapidly address any issue that comes up and prevent any existing problem from growing worse.
    • Easily get it up and running. Users can set up Datadog, configure it, and employ API integrations to connect it to external solutions with ease.

    Datadog Features

    • Customizable and prefabricated monitoring dashboards. Administrators are supplied with two different types of dashboards that they can choose from when they are setting up Datadog. They can customize the dashboards to fit any specialized monitoring need. Additionally, users can choose to use prefabricated dashboards that come with the solution.
    • Disaster recovery feature. Datadog has a built-in feature that enables organizations to continue functioning if some disaster strikes their network. If the network suffers damage, Datadog can restore lost data and infrastructure. Should a digital threat do damage to the network, Datadog ensures that the damage is not irreparable.
    • Vulnerability scanning tool. Users can keep ahead of threats to their networks by employing Datadog’s vulnerability scanning feature. This tool scans the entirety of a user’s network and warns them if a vulnerability is detected. Users can then move to patch these holes in their security before the threat to their network can escalate.

    Reviews from Real Users

    Datadog is a solution that stands out when compared to many of its competitors. It can offer organizations many advantages. Two major advantages are the dashboards that users can create and the monitoring capability that it gives system administrators.

    A senior manager in charge of site reliability engineering at Extra Space Storage writes, “The dashboards we created are core indicators of the health of our system, and it is one of the most reliable sources we have turned to, especially as we have seen APM metrics impacted several times lately. We can usually rely on logs to tell us what the apps are doing.”

    Housecall Pro’s senior director of DevOps writes, “We value the monitoring capability since it allows us to be pushed alerts, rather than having to observe graphs continually.

    Wazuh is an enterprise-ready platform used for security monitoring. It is a free and open-source platform that is used for threat detection, incident response and compliance, and integrity monitoring. Wazuh is capable of protecting workloads across virtualized, on-premises, containerized, and cloud-based environments.

    It consists of an endpoint security agent and a management server. Additionally, Wazuh is fully integrated with the Elastic Stack, allowing users the ability to navigate through security alerts via a data visualization tool.

    • Wazuh’s agent can run on many different platforms, and is lightweight. It can successfully perform the tasks needed to detect threats in order to trigger responses automatically.
    • Wazuh manages the agents, can analyze agent data, and can scale horizontally.
    • Elastic Stack is where alerts are indexed and stored.

    Wazuh Capabilities

    Some of Wazuh’s most notable capabilities include:

    • Intrusion detection: Wazuh’s agents can detect hidden files, cloaked processes, or unregistered network listeners, as well as inconsistencies in system call responses. Wazuh’s server component uses a signature-based approach to intrusion detection, using its regular expression engine to analyze collected log data and look for indicators of compromise.

    • Log data analysis: Wazuh can read operating system and application logs, and securely forward them to a central manager for rule-based analysis and storage.

    • Integrity monitoring: File integrity monitoring can help identify changes in content, ownership, permissions, and attribute of files. Wazuh’s file integrity monitoring can be used in conjunction with threat intelligence.

    • Vulnerability detection: Wazuh agents can identify well-known vulnerable software so you can see where your weak spots are and take action before an attack can exploit them.

    • Configuration assessment: System and application configurations are monitored to make sure they are compliant with security policies. Periodic scans are used to detect applications that are known to be vulnerable, insecurely configured, or unpatched.
    • Incident response: Wazuh responds actively when active threats need to be addressed. It can perform countermeasures like blocking access to a system when a threat source is identified.

    • Regulatory compliance: Wazuh includes the security controls required to be compliant with industry regulations and standards.

    • Cloud security: Wazuh’s light-weight and multi-platform agents are commonly used to monitor cloud environments at the instance level. In addition, Wazuh helps monitor cloud infrastructure at an API level.

    • Security for containers: With Wazuh, you have increased security visibility into hosts and containers, allowing for easier detection of threats, anomalies, and vulnerabilities.

    Wazuh Benefits

    Some of the most valued benefits of Wazuh include:

    • No vendor lock-in
    • No license costs
    • Uses lightweight, multi-platform agents
    • Free community support

    Wazuh Offers

    • Annual support and maintenance
    • Assistance with deployment and configuration
    • Training and instructional hands-on courses

    Reviews From Real Users

    "It's very easy to integrate Wazuh with other environments, cloud applications, and on-prem applications. So, the advantage is that it's easy to implement and integrate with other solutions." - Robert C., IT Security Consultant at Microlan Kenya Limited

    The MITRE ATT&CK correlation is most valuable.” - Chief Information Security Officer at a financial services firm

    Sample Customers
    Adobe, Samsung, facebook, HP Cloud Services, Electronic Arts, salesforce, Stanford University, CiTRIX, Chef, zendesk, Hearst Magazines, Spotify, mercardo libre, Slashdot, Ziff Davis, PBS, MLS, The Motley Fool, Politico, Barneby's
    Information Not Available
    Top Industries
    REVIEWERS
    Financial Services Firm22%
    Computer Software Company14%
    Comms Service Provider11%
    Pharma/Biotech Company5%
    VISITORS READING REVIEWS
    Educational Organization31%
    Computer Software Company12%
    Financial Services Firm10%
    Manufacturing Company6%
    REVIEWERS
    Computer Software Company25%
    Comms Service Provider18%
    Security Firm14%
    Financial Services Firm11%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Comms Service Provider9%
    Financial Services Firm7%
    Government7%
    Company Size
    REVIEWERS
    Small Business37%
    Midsize Enterprise19%
    Large Enterprise44%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise39%
    Large Enterprise45%
    REVIEWERS
    Small Business54%
    Midsize Enterprise28%
    Large Enterprise18%
    VISITORS READING REVIEWS
    Small Business32%
    Midsize Enterprise20%
    Large Enterprise48%
    Buyer's Guide
    Datadog vs. Wazuh
    April 2024
    Find out what your peers are saying about Datadog vs. Wazuh and other solutions. Updated: April 2024.
    769,662 professionals have used our research since 2012.

    Datadog is ranked 3rd in Log Management with 137 reviews while Wazuh is ranked 2nd in Log Management with 38 reviews. Datadog is rated 8.6, while Wazuh is rated 7.4. The top reviewer of Datadog writes "Very good RUM, synthetics, and infrastructure host maps". On the other hand, the top reviewer of Wazuh writes "It integrates seamlessly with AWS cloud-native services". Datadog is most compared with Dynatrace, Azure Monitor, New Relic, AWS X-Ray and Google Cloud's operations suite (formerly Stackdriver), whereas Wazuh is most compared with Elastic Security, Security Onion, Splunk Enterprise Security, AlienVault OSSIM and SentinelOne Singularity Complete. See our Datadog vs. Wazuh report.

    See our list of best Log Management vendors.

    We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.