We performed a comparison between LogPoint and Wazuh based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: LogPoint is noted for its advanced technology and extensive log-collection, parsing, and analysis mechanisms. Wazuh stands out for its effortless integration, excellent log monitoring capabilities, and ELK-based investigation.LogPoint can improve its dashboard customization, resource efficiency, network hierarchy diagrams, and agent deployment. Wazuh needs improvements in event source coverage, threat intelligence integration, and real-time monitoring of Unix systems.
Service and Support: LogPoint's customer service receives high marks for its exceptional technical support and responsive engineers, but some users reported delays in receiving help from higher-level support. Wazuh's customer service is generally deemed satisfactory, and many customers noted that they could easily find answers from community forums.
Ease of Deployment: The complexity of LogPoint's initial setup can range from complex and time-consuming to fast and easy, depending on the user's experience and the organization’s size. Some users said that Wazuh’s setup is easy and fast, while others perceived it as complicated and said it required a significant amount of time.
Pricing: LogPoint's fixed pricing model is seen as cost-effective and competitive. Wazuh is a cost-effective option as it is open-source and completely free to acquire.
ROI: LogPoint makes costs more predictable and enables companies to generate revenue through security operation services. Wazuh's MSP program and partnerships offer opportunities to generate revenue from the platform.
"The most valuable features are the ones that we use the most, which are the search and report facilities."
"We like the user and entity behaviour analytics (UEBA) and find it valuable."
"The search feature is valuable. The dashboards are also valuable for our bosses. Another valuable feature, which is the main feature of the product, is the centralization of all the logs."
"The solution's user interface is quite simple, and the integration is better than other products."
"The flexibility of the search feature and the solution's analytics features are the most valuable parts of the solution."
"The product is easy to use."
"The solution offers excellent reporting features. Our customers have been satisfied that they have been able to meet their compliance needs by giving them a standard report."
"The most valuable feature of LogPoint is that they have the SIEM and SOAR combined in one solution. They are not on a separate platform."
"The product is easy to customize."
"The main thing I like about it is that it has an EDR."
"One of the most beneficial features of Wazuh, particularly in the context of security needs, is the machine learning data handling capability."
"The log monitoring and analysis tools are great in addition to SIEM file activity monitoring."
"My company implemented Wazuh because it was relatively inexpensive. They could quickly get their hands on it to check a box for some audit and compliance."
"Integrates with various open-source and paid products, allowing for flexibility in customization based on use cases."
"If they support a solution, it is easy to do an integration."
"The product’s interface is intuitive."
"It is complicated to collect daily logs from other systems."
"Nowadays the trend is going towards the ransomware and the endpoint detection and response. So if they added something for that, that will be very, very good."
"We were missing visuals and graphics. Recently, a new version seems to have come out, and it has a new graphical user interface. When I was integrating it, it was usable, but the GUI needed improvement."
"Logpoint is not flexible. Its documentation is not user-friendly."
"One of the downsides is it is not a SaaS solution. It must be on-premises."
"It is a good product, but its interface or GUI could be better."
"I know that they have user behavior analytics, but it's an extra cost for this feature. It would be nice if it was in with the standard products."
"Log management could be better because transporting the log from a password to the client system takes time."
"I have yet to find the same capability in Wazuh to get logs from different sources into the system"
"It would be better if they had a vulnerability assessment plug-in like the one AlienVault has. In the next release, I would like to have an app with an alerting mechanism."
"Its configuration process is time-consuming."
"The technical support can be improved. Wazuh has some bugs that need to be fixed. It would be good if we can have automation with respect to incidence responses."
"I think that the next release should be more suitable for large enterprises, because currently they are not because large companies do not rely on open source solutions."
"The biggest part that's missing is threat intelligence. It isn't inbuilt, and if a sudden incident occurs, we don't get that feedback inside the SIEM tool. That's a big gap, I see. It would be better if we could get the threat intelligence feeds integrated with the SIEM tools. That would help us push value solutions to the clients in a big way."
"Integration with Vyara could be better."
"Its user interface for sure can be improved. It is not so comfortable to use if you're looking for specific logs."
Logpoint is ranked 29th in Log Management with 20 reviews while Wazuh is ranked 2nd in Log Management with 38 reviews. Logpoint is rated 7.4, while Wazuh is rated 7.4. The top reviewer of Logpoint writes "Good technical support but it is complex to use and resource-heavy". On the other hand, the top reviewer of Wazuh writes "It integrates seamlessly with AWS cloud-native services". Logpoint is most compared with IBM Security QRadar, Elastic Security, Rapid7 InsightIDR, Microsoft Sentinel and Fortinet FortiSIEM, whereas Wazuh is most compared with Elastic Security, Security Onion, AlienVault OSSIM, Splunk Enterprise Security and Graylog. See our Logpoint vs. Wazuh report.
See our list of best Log Management vendors and best Security Information and Event Management (SIEM) vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.