Try our new research platform with insights from 80,000+ expert users

CompassOne by Blackpoint Cyber vs Graylog Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CompassOne by Blackpoint Cyber
Ranking in Security Information and Event Management (SIEM)
33rd
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
5
Ranking in other categories
Vulnerability Management (40th), Endpoint Detection and Response (EDR) (33rd), Application Control (9th), Managed Detection and Response (MDR) (13th)
Graylog Security
Ranking in Security Information and Event Management (SIEM)
37th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Security Information and Event Management (SIEM) category, the mindshare of CompassOne by Blackpoint Cyber is 0.1%, up from 0.1% compared to the previous year. The mindshare of Graylog Security is 0.6%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM) Market Share Distribution
ProductMarket Share (%)
CompassOne by Blackpoint Cyber0.1%
Graylog Security0.6%
Other99.3%
Security Information and Event Management (SIEM)
 

Featured Reviews

Gary Herbstman - PeerSpot reviewer
Experienced reduced alert fatigue with streamlined notifications
We use Blackpoint Cyber MDR for our higher-end clients who need a higher level of control over security I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real. This feature ensures that I am notified only…
Tony Zafiropoulos - PeerSpot reviewer
Aggregates logs in one place and helps to review data points
We tried Graylog Security, starting with their inexpensive open-source version. We tested it out and continued using it for a while. As for the main differences between Graylog Security and other vendors, some users might prefer cloud-based platforms over on-premises solutions. It isn't inherently cloud-native, but that might not matter much for some.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"The solution is all encompassing and can incorporate email monitoring."
"On my end, the most valuable feature of this solution is that I can install it and forget about it. After that, their SOC team takes over and they only call me when there's a problem."
"On a scale from one to ten, I would rate the overall solution as a ten."
"Their SOC is phenomenal in not monitoring and responding and taking action."
"The solution also watches over Microsoft 365 and keeps a copy of logs."
"The tool aggregates logs. We can see the logs in one place."
"We use the solution to collect logs."
 

Cons

"Some texts seem to report items as normal too quickly."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
"The interface could be more intuitive."
"The feature we keep asking for is a vulnerability scan."
"The solution does not tie into other EDR products like CyberArk or CrowdStrike but that might be more useful."
"The interface could be more intuitive. More transparency is needed in the interface as a lot of details are hidden behind the scenes, making them difficult or impossible to access."
"Graylog Security needs to incorporate security scorecards."
 

Pricing and Cost Advice

"The pricing is reasonable."
"The pricing is in line with other products."
"I rate the tool's pricing a one out of ten."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Healthcare Company
8%
Manufacturing Company
8%
Retailer
7%
Computer Software Company
20%
Educational Organization
11%
Financial Services Firm
6%
Retailer
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What needs improvement with Blackpoint Cyber MDR?
While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement.
What is your primary use case for Blackpoint Cyber MDR?
The solution serves as a baseline security offering. We have implemented it for every client that we do business with.
What do you like most about Graylog Security?
The tool aggregates logs. We can see the logs in one place.
What needs improvement with Graylog Security?
Graylog Security needs to incorporate security scorecards.
 

Also Known As

Blackpoint Cyber Managed Detection + Response, Blackpoint Cyber Managed Detection and Response
No data available
 

Overview

 

Sample Customers

CoreRecon, Peerless Tech Solutions, Lorien Health
Information Not Available
Find out what your peers are saying about CompassOne by Blackpoint Cyber vs. Graylog Security and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.