We performed a comparison between Datadog and Wazuh based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Datadog users like its customizable displays, error tracking, and advanced AI/ML capabilities. Wazuh stands out for its effortless integration, excellent log monitoring capabilities, and ELK-based investigation. Datadog could enhance its usability and reduce its learning curve. Users said integration was another pain point. Wazuh needs improvements in event source coverage, threat intelligence integration, and real-time monitoring of Unix systems.
Service and Support: While many users spoke highly of Datadog’s support team, others reported slow support, especially in the Asia-Pacific region. Wazuh's customer service is generally deemed satisfactory, and many customers noted that they could easily find answers from community forums.
Ease of Deployment: Datadog’s setup is considered straightforward, and users often receive help from a partner or vendor. Some users said that Wazuh’s setup is easy and fast, while others perceived it as complicated and said it required a significant amount of time.
Pricing: Opinions about Datadog's price are divided. Some users found it costly, but others thought it was acceptable. Some said the pricing model could be clearer and better explained. Wazuh is a cost-effective option as it is open-source and completely free to acquire.
ROI: Users said Datadog saved them time and improved visibility into security blind spots. Wazuh's MSP program and partnerships offer opportunities to generate revenue from the platform.
"Overall, the Data UI and the usability of customer features continue to improve."
"I don't have to worry about upgrades with the AWS version."
"It has a high-level insight into the infrastructure model of the application and provides important detailed data on the host and metrics, which is the main concern of our customers."
"It is easy to implement and scale applications with standardized visibility, monitoring and alerting"
"We integrate our application logs. It is great to be able to tie our metrics and our traces together."
"We have been able to set very specific CPU and memory alerts, at the very base level, then we started to pull real business value, like 99th percentile response rates for our API calls."
"Excellent autocomplete for everything in the UI."
"The most useful feature is the APM."
"I find the PCI DSS feature the most valuable, along with the feature that monitors the compliance of Windows and the CIS benchmarks on other devices like Unix or Linux systems."
"One of the most beneficial features of Wazuh, particularly in the context of security needs, is the machine learning data handling capability."
"The tool is stable."
"Some of the strengths of Wazuh that stand out for us include its scalability when deployed on Azure, its open-source nature, which allows for customization based on our needs, and its compatibility with various security solutions like threat intelligence platforms."
"The deployment is easy and they provide very good documentation."
"I like Wazuh because it is a lot like ELK, which I was already comfortable with, so I didn't have to learn from scratch."
"The MITRE ATT&CK correlation is most valuable."
"Wazuh's logging features integrate seamlessly with AWS cloud-native services. There are also Wazuh agent configurations for different use cases, like vulnerability scanning, host-based intrusion detection, and file integrity monitoring."
"Datadog could make their use cases more visible either through their docs or tutorial videos."
"As a new customer, the Datadog user interface is a bit daunting."
"We would like to see smaller or shorter tutorials and video sessions."
"I'm not sure if Datadog can monitor K8s deployments in real-time. For instance, being able to see a deployment step by step visually. This would be helpful if there were any incidents during the deployment."
"It would be nice to be able to graph metrics by excluding certain tags (like you can do in monitors)."
"One thing we have run into is that it is so easy to add monitoring that we turn on things without really understanding the costs."
"ECS could be improved by including more tutorials for beginners to reduce the barriers to entry."
"I want to applaud the efforts in making the UI extremely usable and approachable. My suggestion would be to take another look at how the menu structure is put together, however. Even after using the platform mostly every day for months, I still find myself trying to find a service or feature in the menus."
"We would like to see more improvements on the cloud."
"Wazuh is missing many things that a typical SIEM should have."
"Wazuh needs more security and features, particularly visualization features and a health monitor."
"The computing resources are consuming and do not make sense."
"Its user interface for sure can be improved. It is not so comfortable to use if you're looking for specific logs."
"Alerts should be specific rather than repeatedly triggered by integrating multiple factors. This issue needs improvement to create a more efficient alert system."
"The tool does not provide CTI to monitor darknet."
"Wazuh could improve the detection, it is not detecting all of the attacks. Additionally, it is lacking features compared to other solutions."
Datadog is ranked 3rd in Log Management with 137 reviews while Wazuh is ranked 2nd in Log Management with 38 reviews. Datadog is rated 8.6, while Wazuh is rated 7.4. The top reviewer of Datadog writes "Very good RUM, synthetics, and infrastructure host maps". On the other hand, the top reviewer of Wazuh writes "It integrates seamlessly with AWS cloud-native services". Datadog is most compared with Dynatrace, Azure Monitor, New Relic, AWS X-Ray and Google Cloud's operations suite (formerly Stackdriver), whereas Wazuh is most compared with Elastic Security, Security Onion, Splunk Enterprise Security, AlienVault OSSIM and Microsoft Defender for Cloud. See our Datadog vs. Wazuh report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.