No more typing reviews! Try our Samantha, our new voice AI agent.

Cynet vs Graylog Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 18, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
108
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Cynet
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
45
Ranking in other categories
Security Information and Event Management (SIEM) (11th), Endpoint Protection Platform (EPP) (13th), User Entity Behavior Analytics (UEBA) (3rd), Endpoint Detection and Response (EDR) (12th), Threat Deception Platforms (2nd), Network Detection and Response (NDR) (4th), Extended Detection and Response (XDR) (9th), Ransomware Protection (3rd)
Graylog Security
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
2
Ranking in other categories
Security Information and Event Management (SIEM) (46th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Roshan Jadhav - PeerSpot reviewer
Technical Consultant at Vincacyber
Has improved threat detection and streamlined incident analysis through centralized control and AI-driven insights
People are looking for Cynet because it has next-generation threat protection that detects zero-day threats. It has UEBA (user entity behavior analysis), threat hunting features, and storage device control where we can create profiles and block unauthorized USB storage devices. We can also create threat protection policies to detect malware, ransomware, and many other threats. The most valuable feature is the UBA (User behavior analysis). It has integration with SIEM solutions, allowing us to share our logs to third-party SIEM servers. Cynet has AI integration which showcases complete forensic data about threats, making it very easy to understand what happened with the system and what type of incident was detected. Autonomous breach protection is a feature of Cynet which can detect and mitigate known and unknown threats based on signatures. If there are any signature-less files, malware, or ransomware, it will detect them based on autonomous breach protection capabilities. The centralized management console provides a dashboard where we can see four types of attack vectors and incident counts in real-time. It continuously scans the radar and shows open alerts related to files, hosts, users, or networks. We can easily export these alerts and send reports via email.
Tony Zafiropoulos - PeerSpot reviewer
Owner/ Chief Engineer at Fixvirus.com
Aggregates logs in one place and helps to review data points
We tried Graylog Security, starting with their inexpensive open-source version. We tested it out and continued using it for a while. As for the main differences between Graylog Security and other vendors, some users might prefer cloud-based platforms over on-premises solutions. It isn't inherently cloud-native, but that might not matter much for some.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"One of the main benefits of the solution is its intelligence to correlate the events into an incident."
"The product is mostly automated, and we do not have to make decisions, because all the decisions are made by the product itself and we are not required to create any custom policies since the policies that are created are well defined in the product itself."
"My advice for anybody who is considering Cortex XDR is that it is a complete solution, and has very good features."
"The stability of the solution is very good. We have about 100 users on it right now, and we use it twice a week."
"From the Palo Alto side, whatever they buy, they integrate that really well into their integration suite, and that makes a massive difference."
"The stability of the solution is very good, we have about 100 users on it right now, and we use it twice a week."
"The solution's stability is generally good."
"I don't have to do much monitoring with it; I don't have to have anybody manually looking at this, it gives us reports, and it lets us know if something needs to be addressed, and we can easily address it."
"The dashboard is very beautiful because it provides everything on a centralized console."
"A good feature is how the solution packages varied information into a single dashboard that's readable and meets our needs."
"Cynet is light and transparent when downloaded. The product's data aggregation is also valuable since you can see everything you need on a page."
"In terms of incident response, Cynet can contain attacks, offer a trial period to customers, and uninstall if not continued. The most valuable aspect is its integration capabilities, covering endpoints and network data for a comprehensive view of threats."
"The initial setup is simple and user-friendly."
"The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated. For people responsible for using this infrastructure for the first line of workstation monitoring, it's quite easy to use."
"The dashboard is beautiful, overall easy of use, and the UBA and NBA features are valued."
"It can be deployed in autonomous mode, and then it automatically blocks malware threats."
"We use the solution to collect logs."
"The tool aggregates logs. We can see the logs in one place."
 

Cons

"Traps doesn't work with McAfee. You need to remove McAfee to install Traps. This is very common, and its nothing that should be an issue. Some antivirus engines recognize Traps as an threat component, so maybe they need to shake hands somewhere."
"The MAC agent is not as robust feature-wise as the PC version."
"The solution should enhance the ADR and reporting."
"Cortex XDR is trickier to configure than other Palo Alto products. This is one area where we are not so satisfied."
"The installation should be easier and the Palo Alto pre-sales and sales teams should have more information on the product because they don't know what they are selling."
"There are some default policies which sometimes affect our applications and cause them to run around. In the hotel industry, we use a different type of data versus Oracle and SQL. By default, there are some policies which stop us from running properly. Because of this, the support level is also not that strong. We have to wait to get a results."
"Currently, if you use Palo Alto endpoint protection as the only solution it's very complicated to remove pre-existing threats."
"In general, the price could be more competitive."
"I cannot provide more details about Cynet's automation features. While Cynet claims to be automated, the specifics of this automation are unclear. They claim to have a high capability to detect and block attacks, but I am cautious about companies that claim to solve every problem without limitations. It does help in identifying malware on the network but doesn't specifically identify vulnerabilities."
"In terms of what could be improved, I would say the usability of this product for new threats. Meaning, not everything which is new is properly seen by the product and not all the required actions are taken."
"Previously, we used Cynet, but transitioned to Trend Micro due to the lack of complete SSO services, which were costly."
"Cynet is capable and cloud-based, however, enterprise organizations often prefer on-premises servers for managing entire organizations."
"I suppose everybody's working on AI these days. So, I would like to see more about AI-based threats."
"A support center in Asia is needed."
"Functions-wise, at present the times for events are not a user's local time, but we assume that will be corrected soon."
"A support center in Asia is needed."
"Graylog Security needs to incorporate security scorecards."
 

Pricing and Cost Advice

"The return on investment is from the user side because we have seen the performance of it increase the delivery time of the product if we are using too many web-based and on-premise applications. In indirect ways, we saw the return of investment in terms of performance and user satisfaction increase."
"The tool's price is moderate."
"It is present, but when compared to other competitive products, I would say it is not less expensive; however, when all of the other added values are considered, the price is reasonable."
"The price of the solution is high for the license and in general."
"This is an expensive solution."
"The price of the solution could be reduced. I have customers that have voiced that the solution is good for the value but if I want to sell more of the solution the price reduction would help."
"I am using the Community edition."
"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"The price is very competitive."
"It costs us 20,000 to 28,000 per year."
"Our billing is on a quarterly basis, but they have monthly or annual billing availability."
"My company's customers have to make yearly payments towards the licensing costs of the solution. Cynet is not expensive."
"There is an extra cost if you want the support of Cynet."
"Cynet is cheap."
"The licensing for Cynet is yearly. The solution pricing depends on the customer, but it is not very expensive."
"it's not cheap, but I would rate it a three out of ten. If one is cheap and ten is expensive."
"I rate the tool's pricing a one out of ten."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
885,376 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
13%
Manufacturing Company
8%
Computer Software Company
8%
Financial Services Firm
8%
Manufacturing Company
10%
Financial Services Firm
9%
Comms Service Provider
8%
Computer Software Company
8%
Educational Organization
16%
Retailer
9%
Financial Services Firm
9%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise7
Large Enterprise12
No data available
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
When evaluating User Activity Monitoring, what aspect do you think is the most important to look for?
The support team that stands behind the detection and response. Is there adequate expertise and are they behind you ...
What do you like most about Cynet?
In terms of incident response, Cynet can contain attacks, offer a trial period to customers, and uninstall if not con...
What is your experience regarding pricing and costs for Cynet?
Cynet is not very costly. We can refer it to other customers because Cynet does not ask for additional costs for add-...
What do you like most about Graylog Security?
The tool aggregates logs. We can see the logs in one place.
What is your primary use case for Graylog Security?
I feed different data points to the tool and review them.
What advice do you have for others considering Graylog Security?
I rate the overall product an eight out of ten. It's a good option for getting started.
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
No data available
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Meuhedet, East Boston Neighborhood Health Center
Information Not Available
Find out what your peers are saying about Cynet vs. Graylog Security and other solutions. Updated: March 2026.
885,376 professionals have used our research since 2012.