Graylog vs Security Onion comparison

Cancel
You must select at least 2 products to compare!
Graylog Logo
10,317 views|8,658 comparisons
94% willing to recommend
Security Onion Solutions, LLC Logo
2,763 views|2,334 comparisons
66% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Graylog and Security Onion based on real PeerSpot user reviews.

Find out in this report how the two Log Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Graylog vs. Security Onion Report (Updated: April 2024).
768,886 professionals have used our research since 2012.
Featured Review
Andrey Mostovykh
Jörg Kippe
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"I like the correlation and the alerting.""UDP is a fast and lightweight protocol, perfect for sending large volumes of logs with minimal overhead.""The solution's most valuable feature is its new interface.""Real-time UDP/GELF logging and full text-based searching.""The product is scalable. The solution is stable.""The ability to write custom alerts is key to information security and compliance.""Graylog's search functionality, alerting functionality, user management, and dashboards are useful.""We run a containerized microservices environment. Being able to set up streams and search for errors and anomalies across hundreds of containers is why a log aggregation platform like Graylog is valuable to us."

More Graylog Pros →

"Security Onion is the most mature solution in the market.""The most valuable feature of Security Onion for security monitoring is its ability to find infected ports.""We use Security Onion for internal vulnerability assessment."

More Security Onion Pros →

Cons
"Dashboards, stream alerts and parsing could be improved.""I hope to see improvements in Graylog for more interactivity, user-friendliness, and creating alerts. The initial setup is complex.""Graylog needs to improve their authentication. Also, the fact that Graylog displays logs from the top down is just ridiculous.""It would be great if Graylog could provide a better Python package in order to make it easier to use for the Python community.""Lacks sufficient documentation.""Its scalability gets complicated when we have to update or edit multiple nodes.""We ran into problems with Elasticsearch throwing a circuit-breaking exception due to field data size being too large. It turned out that the heap size directly impacted this size in a high-throughput environment, causing unexplained instability in Graylog. We were able to troubleshoot on the Elasticsearch size, but we should have been able to reference some minimum requirements for Graylog to know that our settings weren't sufficient.""I would like to see a date and time in the Graylog Grok patterns so that I can save time when searching for a log. I like how the streams and the search query work, but adding a date and time will allow me to pull out a log in a milli-second."

More Graylog Cons →

"The initial setup of the solution is a little bit difficult.""Security Onion's user interface could be improved.""The product is not easy to learn."

More Security Onion Cons →

Pricing and Cost Advice
  • "Having paid official support is wise for projects."
  • "I am using a community edition. I have not looked at the enterprise offering from Graylog."
  • "If you want something that works and do not have the money for Splunk or QRadar, take Graylog.​​"
  • "​You get a lot out-of-the-box with the non-enterprise version, so give it a try first."
  • "Consider Enterprise support if you have atypical needs or setup requirements.​"
  • "I use the free version of Graylog."
  • "It's an open-source solution that can be used free of charge."
  • "We're using the Community edition."
  • More Graylog Pricing and Cost Advice →

  • "Security Onion is a free solution."
  • "It is an open-source solution."
  • "Security Onion is an open-source solution."
  • More Security Onion Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    768,886 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The product is scalable. The solution is stable.
    Top Answer:We are using the free version of the product. However, the paid version is expensive.
    Top Answer:Since it's a free tool, I don't have much to say. Troubleshooting is important to me. The initial setup is complex. I hope to see improvements in Graylog for more interactivity, user-friendliness, and… more »
    Top Answer:The most valuable feature of Security Onion for security monitoring is its ability to find infected ports.
    Top Answer:Security Onion is an open-source solution. On a scale from one to ten, where ten is expensive and one is cheap, I rate the solution's pricing a six out of ten.
    Top Answer:The initial setup of the solution is a little bit difficult.
    Ranking
    11th
    out of 95 in Log Management
    Views
    10,317
    Comparisons
    8,658
    Reviews
    6
    Average Words per Review
    802
    Rating
    7.3
    37th
    out of 95 in Log Management
    Views
    2,763
    Comparisons
    2,334
    Reviews
    3
    Average Words per Review
    330
    Rating
    7.7
    Comparisons
    Also Known As
    Graylog2
    Learn More
    Overview

    Graylog is purpose-built to deliver the best log collection, storage, enrichment, and analysis. Graylog is:

    • Considerably faster analysis speeds.
    • More robust and easier-to-use analysis platform.
    • Simpler administration and infrastructure management.
    • Lower cost than alternatives.
    • Full-scale customer service.
    • No expensive training or tool experts required.

    Security Onion is a free and open Linux distribution for threat hunting, enterprise security monitoring, and log management. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
    Security Onion includes a native web interface with built-in tools analysts use to respond to alerts, hunt for evil, catalog evidence into cases, monitor grid performance, and much more. Additionally, third-party tools, such as Elasticsearch, Logstash, Kibana, Suricata, Zeek (formerly known as Bro), Wazuh, Stenographer, CyberChef, NetworkMiner, and many more are included.

    Sample Customers
    Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company16%
    Comms Service Provider11%
    Government8%
    Educational Organization7%
    VISITORS READING REVIEWS
    Computer Software Company13%
    Government11%
    University10%
    Comms Service Provider9%
    Company Size
    REVIEWERS
    Small Business50%
    Midsize Enterprise7%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business32%
    Midsize Enterprise18%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business29%
    Midsize Enterprise19%
    Large Enterprise52%
    Buyer's Guide
    Graylog vs. Security Onion
    April 2024
    Find out what your peers are saying about Graylog vs. Security Onion and other solutions. Updated: April 2024.
    768,886 professionals have used our research since 2012.

    Graylog is ranked 11th in Log Management with 18 reviews while Security Onion is ranked 37th in Log Management with 3 reviews. Graylog is rated 8.0, while Security Onion is rated 7.6. The top reviewer of Graylog writes "Great detailed search features and easy Java integration, but needs improvement in integration with Python". On the other hand, the top reviewer of Security Onion writes "A mature and affordable solution that is easy to install and easy to update". Graylog is most compared with Grafana Loki, Wazuh, syslog-ng, Splunk Enterprise Security and VMware Aria Operations for Logs, whereas Security Onion is most compared with Wazuh, Elastic Stack, TheHive, Splunk Enterprise Security and Kali Linux. See our Graylog vs. Security Onion report.

    See our list of best Log Management vendors.

    We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.