Wazuh Primary Use Case

Vikrant Puranik - PeerSpot reviewer
Manager Cloud Security Operations at TraceLink, Inc.

Our company only has a small five-person team working with Wazuh. We wanted a log management solution that we could deploy onto our cloud, so we deployed Wazuh on Kubernetes and integrated different log sources into a centralized logging solution.

The second use case is log searching. We wanted a usable integrated search, and Wazuh a good search integrated usable. Wazuh has support for Elasticsearch, which provides searching capabilities. Cost-effectiveness was important for us, and Wazuh is a top open source solution. 

View full review »
AKASH MAJUMDER - PeerSpot reviewer
SOC Analyst at Ovelosec

Our main use case for Wazuh is in the healthcare industry, where we deploy it to help companies monitor their products during deployment. However, we also utilize Wazuh for IoT and OT, as well as for endpoint detection and response.

View full review »
SyedAli17 - PeerSpot reviewer
Confidential at PTA

We primarily use Wazuh for internal security monitoring to ensure the safety of our organization's internal systems. We have two specific requirements: first, we use it to monitor our internal operations, which is essential for general security purposes. Second, we rely on Wazuh to manage the security of the National Telecom department's specialized software. This second requirement involves using multiple SOC solutions. However, within our organization, Wazuh's main focus is on monitoring our internal software.

View full review »
Buyer's Guide
Wazuh
March 2024
Learn what your peers think about Wazuh. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,995 professionals have used our research since 2012.
AliAhangari - PeerSpot reviewer
Founder and CTO at Soorin

We primarily use the solution as a cybersecurity monitoring solution. It has a powerful endpoint agent and can work as an EDR for endpoint detection and response. 

We gather information about the company and identify data sources. We develop a use case around them and have a specified case output. For example, if we want to do hard test or service scans, we gather some event logs from the firewalls, et cetera, and develop some logic. The logic will help us detect anomalies during hard scans. We use Wazuh for log extraction and logic application. It is a general framework. 

View full review »
RA
Informatics Engineering Lecturer at Innovation Center STMIK AMIKOM

The primary use case for Wazuh is the detection of malware.

View full review »
CG
Principal Architect at Calsoft

Our primary use case for Wazuh is monitoring endpoints. The second is incident management. Logging is essential for us because of Indian IT compliance rules require us to store logs for 180 days. We need to monitor and maintain logs also. 

Wazuh is monitoring around 1,200 inputs, but there are only about four or five members of the IT team directly using the solution. 

View full review »
David Arianto - PeerSpot reviewer
Chief Operating Officer at PT. Visionet Data Internasional

We use it as a cost-effective solution for our customers who are in the initial stages of adopting security measures. Many of these customers are new to security practices and are primarily seeking compliance with regulations.

View full review »
MB
Software Engineer at a computer software company with 1,001-5,000 employees

We are using Wazuh for security information and event management, PCI DSS compliance, auditing, real-time sensitive monitoring, and meeting regulatory requirements.

View full review »
Idris Aliyu - PeerSpot reviewer
Senior Systems Engineer at a insurance company with 201-500 employees

Wazuh is very good. It offers the ability to measure and benchmark your environment to one of the standards. We installed it on the customer's premises and benchmarked it against CIS controls. We are not in a big environment, and we haven't tested Wazuh for long.

View full review »
SS
Senior Director of Engineering - Information Security at Apna

We use it to find any aberration in our endpoint devices. For example, if someone installs a game on their company laptop, Wazuh will detect it and inform us of the unauthorized software or unintended use of the devices provided by the company. 

So it can detect more than just games. You can customize it to detect specific software. We have a whitelist of approved software, and Wazuh compares it with the software installed on the device. If there are any mismatches, it reports it to us. So, for instance, we can whitelist Facebook, Blackboard, and YouTube.

View full review »
Rizwan-Alam - PeerSpot reviewer
Head Information Security at Akhtar Fuiou Technologies

I use this product as an integrity marketing solution in the financial sector. We are users of Wazuh and I'm head of information security. 

View full review »
Wajih Ul Hasan - PeerSpot reviewer
Cyber Security Engineer at Digit Labs

I use Wazuh as an open-source solution for SIEM and file integrity monitoring. I have conducted a few POCs in the bank sectors, as well as demos specifically regarding SIEM. 

In Pakistan, we have a state bank that controls the regularities. The banking sector wants to save money and is only interested in compliance. Our company helps them with this. Wazuh is used for file integrity monitoring on Unix, Linux, and Windows systems.

Wazuh is available on the cloud, however,  it depends on the customer. I work with the financial sector, which does not want its data to be on a public or private cloud.

View full review »
Robert Cheruiyot - PeerSpot reviewer
IT Security Consultant at Microlan Kenya Limited

The solution can be used for monitoring changes on the endpoint of machines. It focuses mostly on endpoints and the dangers that may come through. 

View full review »
Sulabh Khanal - PeerSpot reviewer
Head of DevSecOps at Vairav Technology

We're using it in our company as well as our customer's companies. 

It is usually used for SIM and log collection and licenses.

View full review »
PrzemekAndula - PeerSpot reviewer
Cybersecurity specialist at a manufacturing company with 51-200 employees

My company uses Wazuh in our lab environment, where we have 100 endpoints.

View full review »
Gopinath Ravirajan - PeerSpot reviewer
IT Lead at a financial services firm with 51-200 employees

We use Wazuh for PCI compliance monitoring. It can detect whether a server or PCA node is PCI compliant.

View full review »
Vijay Muddu - PeerSpot reviewer
Manager server admin and security at Vivaconnect

We wanted a solution as an in-house SIEM tool, which can collect security and order logs for compliance purposes. We tried to explore a lot of tools and considering our budget and use cases, this tool matched our requirements.

We have five to seven users and we will be adding more users.

View full review »
SHEERAZ AHMED - PeerSpot reviewer
Managing Director at SharpTel

It is a basic level requirement for the compliance factor. There is regulatory compliance by the regulator called CDDISR, and we need to ensure that all the network's critical components send the logs. Wazuh allows us to complete forensic tasks to track any attacks.

View full review »
Dr. Sushan Banerjee - PeerSpot reviewer
GISO - Global Information Security Officer at Beyon Connect

We integrated all of our services and infrastructure in the cloud with Wazuh.

View full review »
Chetan_Sharma - PeerSpot reviewer
Linux System Administrator at Amity Software Systems Limited

We use the solution for vulnerability metrics, auditing, and detecting SQL injection attacks.

View full review »
Youssef EL AZZOUZI - PeerSpot reviewer
Intern Master in Cybersecurity and Cybercrime at Université Abdelmalek Essaâdi

We use the solution for endpoint detection and response. It helps us detect malicious files.

View full review »
GS
Vice President Information Technology and Security at a comms service provider with 201-500 employees

Wazuh is used for event information and management. We have several events that are of interest, and Wazuh lets our folks know if any of them trigger.

View full review »
Usman Arif - PeerSpot reviewer
Cyber Security Engineer at Ebryx (Pvt.) Ltd

It is used primarily for event management in our organization, which falls into the category of an edge Intrusion Detection System (IDS) or host Internet protection system. Our company is not very large, with around twenty to thirty servers and approximately one hundred fifty to two hundred endpoints. Wazuh serves as a centralized platform for collecting security events and managing vulnerabilities across your systems. Its main purpose is to analyze and improve the overall security posture of our organization.

View full review »
Md Salim Hossain Hossain - PeerSpot reviewer
Cyber Digital Transformation Engineer at OneWorldInfoTech

We use Wazuh for the onboarding of both Windows and Linux machines, as well as for firewall and SIM configuration. The IP address is automatically blocked if a server has multiple wrong passwords.

View full review »
Haad Fida - PeerSpot reviewer
Software Engineer at 7Vals

We use the solution for event monitoring.

View full review »
Maikel Richard Villar Rodriguez - PeerSpot reviewer
Cybersecurity supervisior at Optical Network

My main use case for Wazuh is checking security events.

View full review »
Shaamil Ashraff - PeerSpot reviewer
Architect - Database Administration at Mitra Innovation

We use Wazuh as a SIEM tool for log aggregation and understanding different compliances. If there are vulnerabilities in the operating systems, that can be traced using Wazuh.

View full review »
MU
Lead Security Engineer at a tech services company with 201-500 employees

We use Wazuh as a SIEM instead of Logstash, so it's like a managed version of ELK. We customized queries and search detection according to that. The good thing is that it also provides a module called Monitor, and using that, we set up alerts to Slack or email. Then, based on Slack, we implemented an automation to prevent things as per our demands.

View full review »
ShubhamKumar - PeerSpot reviewer
Project Lead at a tech services company with 51-200 employees

Our primary use case is for monitoring the cloud as well as infrastructure.

View full review »
Pathick Kerketta - PeerSpot reviewer
Manager (Information Security) at Girnarsoft Private Limited

We use Wazuh for inventory, logging activity, malware detection, and detecting hidden processes running on the server. 

View full review »
OP
Security Analyst at a tech services company with 501-1,000 employees

We use Wazuh to deliver security features in a venture capital company project focused on building a mobile application.

View full review »
RS
Tech Lead Security at a comms service provider with 51-200 employees

We are using Wazuh for our SOC environment. We are managing and monitoring our infrastructure using the Wazuh SIEM

View full review »
SP
Chief Information Security Officer at a financial services firm with 501-1,000 employees

We collect logs in it, and then we correlate logs against the MITRE ATT&CK framework. We have configured some notifications.

View full review »
VS
Security engineer at a tech services company with 51-200 employees

We use Wazuh for internal testing, instant response, security operations, and compliance.

View full review »
Buyer's Guide
Wazuh
March 2024
Learn what your peers think about Wazuh. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,995 professionals have used our research since 2012.