IT Central Station is now PeerSpot: Here's why

Top 8 Log Management

SplunkDatadogIBM QRadarDevoCheck Point Security ManagementIBM SevOne Network Performance Management (NPM)Elastic SecurityLogRhythm NextGen SIEM
  1. leader badge
    It is the best tool if you have a complex environment or if data ingestion is too huge. The indexing and data collection are valuable.
  2. leader badge
    The dashboards and the performance of the software have been great.The many dozens of integrations that the solution brings out of the box are excellent.
  3. Buyer's Guide
    Log Management
    July 2022
    Find out what your peers are saying about Splunk, Datadog, IBM and others in Log Management. Updated: July 2022.
    620,319 professionals have used our research since 2012.
  4. leader badge
    The monitoring and dashboards are great. IBM Qradar's ability to simplify the number of events, not only on a technical level but by making that information easy to pan through the orchestration deduplication. It is very impressive given that we have hundreds of devices that send event logs through.
  5. The querying and the log-retention capabilities are pretty powerful. Those provide some of the biggest value-add for us.The most powerful feature is the way the data is stored and extracted. The data is always stored in its original format and you can normalize the data after it has been stored.
  6. HA Structure provides good coverage and works fine.The control is granular, so you can set policy profiles for different organizational profiles.
  7. One of the most valuable features is the graphs, which you can build instantly. I have used some open-source platforms in the past, but they are not as good. With SevOne, the sampling in the graph can be every few seconds, not just every few minutes, and that's really helpful. It's really fast.
  8. report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    620,319 professionals have used our research since 2012.
  9. We chose the product based on the ability to scan for malware using a malware behavioral model as opposed to just a traditional hash-based antivirus. Therefore, it's not as intensive.
  10. As a SIEM, probably the best feature is that it can be tuned effectively. There are very few SIEMs out there that can be effectively tuned to provide you with meaningful information and not be overwhelmed.

Advice From The Community

Read answers to top Log Management questions. 620,319 professionals have gotten help from our community of experts.
HAPPY BHALLA - PeerSpot reviewer
HAPPY BHALLA
Senior Software Engineer at a tech services company with 501-1,000 employees

Dear community members, 

I've been exploring Datadog vs ELK and I need your opinion about both of them in terms of performance, cost, and efficiency? Which one would you recommend?

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranDatadog: Unify logs, metrics, and traces from across your distributed… more »
6 Answers
Nurit Sherman - PeerSpot reviewer
Nurit Sherman
Content Specialist
PeerSpot (formerly IT Central Station)
Hi community members, We know it's important to conduct a trial and/or proof of concept as part of the buying process.  Do you have any advice for our community about the best way to conduct a trial or PoC? How do you conduct a trial effectively?  Are there any mistakes to avoid?
Read More »
Carl Phillips - PeerSpot reviewer
Carl PhillipsAt the risk of sounding flippant,  I personally believe that the best way to… more »
9 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)
How do log management and SIEM differ? Is it necessary to have separate tools for each function or can these functions be rolled into one solution? Which products are best for SIEM, and which are better for log management? Do you have recommendations of products that effectively combine both log...
Read More »
Lindsay Mieth - PeerSpot reviewer
Lindsay MiethRony, Daniel's answer is right on the money.  There are many solutions for each… more »
6 Answers
Ariel Lindenfeld - PeerSpot reviewer
Ariel Lindenfeld
Sr. Director of Community
PeerSpot (formerly IT Central Station)

Dear members, 

Let the community know what you think. Share your professional opinion!

Jeff Uhlich - PeerSpot reviewer
Jeff Uhlich-Searchability -Compression -Encryption
19 Answers

Log Management Articles

Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Jun 20 2022
Hi PeerSpot community members, This is a fresh-from-the-oven Community Spotlight for you. Here, we've summarized and selected the latest posts (professional questions, articles and discussions) by PeerSpot community members. Check them out! Also, please share with us your feedback and suggestio...
Read More »
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
May 02 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features...
Read More »

Log Management Topics

Key Benefits of Log Management & Monitoring

The benefits of log management and monitoring systems include:

● Unified storage

Not only does having all logs in one place make analysis much easier, but unified storage also enhances your system security. The time between when a threat occurs and when you notice it and take action is crucial, and when you store all log information together, it speeds up this process. When your logging is centralized this also means it is standardized, which makes it easier to search for information across logs from various sources.

● Better security

Log management tools offer customizable real-time alerts, which means that in case of a security breach you can react immediately and prevent further damage from the attacker. You can adjust your monitoring settings to track a custom selection of events, which is also useful for security.

● Improved troubleshooting

One of the most common uses of event logs is for network troubleshooting.
A log management tool allows you to customize your search and analysis of large amounts of data, allowing you to more easily discover connections between events and pinpoint the source of whatever issue you are having.

● Log file parsing

Parsing is the division of data into smaller pieces of information, making it easier to store and manipulate. Similar data structures need to be recognized and then information grouped according to those structures. For example, tracking the activity of a particular user or identifying all timestamps and then gathering logs from a certain timeframe.

● Data analytics

The data your company stores contains all kinds of valuable information. Data analytics cleanses and transforms data with goals such as predicting behavior, helping to make business decisions, and providing new information. For instance, analyzing customer logs could predict that customers are more likely to make a purchase on a particular day of the week, help you decide to target your next marketing campaign toward a different type of audience, or provide you with useful new information about your customers.

Importance of Log Management in DevOps

For DevOps (the combination of software development and IT operations into a single team), automation is essential in shortening the systems development lifecycle while continuously delivering high-quality software.


Log management is useful when things are running normally, as mentioned above, to provide you with information and help you make business decisions. But logs are also your first indication when a problem is occurring. There are all kinds of issues that need to be caught, and not all of them necessarily show up in the user interface. There are bugs that waste resources, open security holes, and degrade performance, often without being obvious. Other problems can affect the user but it might be hard to trace them to their cause without the right information.

Log management is especially important for cloud-native applications because they are so dynamic and the data is so distributed. Each set of logs also generates database logs, infrastructure logs, subcomponent logs, etc., creating a multitude of potential sources for whatever issue happens to arise. There is so much raw data available that it’s virtually impossible for a human being to sort through the information and figure out what is and isn’t valuable. Statistical analysis involves a great deal of number-crunching as well as comparison with previous log data. Sophisticated software assistance is necessary in order to get insights out of that much data. Log management provides a holistic, realistic view that enables visibility, allowing you to identify trends across your company’s entire infrastructure, so that you can adapt early and prevent problems rather than waiting to solve them after they crop up.



Buyer's Guide
Log Management
July 2022
Find out what your peers are saying about Splunk, Datadog, IBM and others in Log Management. Updated: July 2022.
620,319 professionals have used our research since 2012.