Try our new research platform with insights from 80,000+ expert users

Elastic Security vs syslog-ng comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Elastic Security
Ranking in Log Management
9th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
66
Ranking in other categories
Security Information and Event Management (SIEM) (5th), Endpoint Detection and Response (EDR) (15th), Security Orchestration Automation and Response (SOAR) (7th), Extended Detection and Response (XDR) (8th)
syslog-ng
Ranking in Log Management
16th
Average Rating
9.0
Reviews Sentiment
3.2
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Log Management category, the mindshare of Elastic Security is 3.0%, down from 3.7% compared to the previous year. The mindshare of syslog-ng is 1.8%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management Mindshare Distribution
ProductMindshare (%)
Elastic Security3.0%
syslog-ng1.8%
Other95.2%
Log Management
 

Featured Reviews

Laurentiu Popescu - PeerSpot reviewer
Chief Product Officer at ClusterPower
Has improved threat detection with deep log analysis and streamlined investigation workflows
The most useful features I find in Elastic Security are the forensic ones that allow us to carry deeper analysis into the logs for in-depth investigations, and the dashboards, with the reporting dashboard being quite user-friendly. Elastic Security is quite good at identifying threats, as it is part of the deep investigation tool that I mentioned before. Unless we need to look further into a certain log, we can carry out a deeper analysis and forensics on those particular logs. I can assess the impact of Elastic Security's real-time data analysis on our threat response efficiency as working pretty good. We are looking for real-time analysis because we have a continuous inflow of logs from different sources: from our cloud, from Active Directory, from our network. So it works pretty well.
OC
IT Infrastructure & Cloud Security Manager at Thux
Has ensured compliance by centralizing log data and supporting secure connections
We currently do not use that feature. We currently have just an open-source release, not a premium release. My boss has indicated that he wants to buy a premium syslog-ng version next month. I think we can use other features of this tool in the future. In syslog-ng, I think a GUI would be beneficial. I am unsure if the premium module has a GUI to administer it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution's most valuable features are anomaly detection and connectivity reporting."
"The most valuable feature is the machine learning capability."
"Elastic Security offers advanced features such as machine learning and integration with ChatGPT."
"The most valuable feature is the speed, as it responds in a very short time."
"The tool's functionality is good for overall security and incident response times."
"We've found the initial setup to be quite straightforward."
"Elastic Security is cost-effective compared to Defender and CrowdStrike."
"It's open-source and free to use."
"For us, the most valuable feature is the use of compound search for searching logs at a specific time, by a specific user, or specific behavior."
"Syslog-ng has a separate config file in addition to the core configuration."
"The ability to extract and store the logs is the most valuable feature of syslog-ng."
"Syslog-ng provides easy access to all my logs. It helps me show managers and other clients precisely where an incident occurred. I also like it because you can integrate syslog-ng with multiple solutions to allow real-time monitoring."
"We chose syslog-ng because it is easy to install, easy to maintain, easy to update, and due to the fact that all data arrive in raw format, we can manipulate it as we want."
"Syslog-ng has built-in features that we can use to create alerts for a SIEM solution. It isn't a true SIEM solution, but it's sufficient for the time being."
"What I appreciate most about syslog-ng is its configuration; its C-style config is much easier to understand, read, and write than other popular solutions such as syslog or rsyslog."
 

Cons

"The tool needs to integrate with legacy servers. Big companies can have legacy servers that may not always be updated."
"This solution cannot do predictive maintenance, so we have to build our own modules for doing it."
"Elastic Security can be a bit difficult to use if a person only has experience in SMBs with tools like Zoho. The product can also be difficult for those who have never dealt with query language."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"One thing they could add is a quick step to enable users who don't have a solid background to build a dashboard and quickly search, without difficulty."
"The problem with ELK is it's difficult to administer. When you have a problem, it can be very, very difficult to rebuild indexes."
"We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."
"Elastic Security consumes a lot of resources, requiring a substantial deployment setup."
"In syslog-ng, I think a GUI would be beneficial. I am unsure if the premium module has a GUI to administer it."
"There is always the potential for additional integration and protocol extensions."
"It's hard to find people who know how to use syslog-ng. I often find problems with configurations, and solutions aren't integrated correctly with syslog-ng. For example, there might be data with extra decimals, or the collector agents are incorrectly named. It isn't a problem with the solution; it's a lack of professionals."
"There is room for improvement in terms of observability."
"The filtering has room for improvement."
"Syslog-ng has built-in features that we can use to create alerts for a SIEM solution. It isn't a true SIEM solution, but it's sufficient for the time being."
 

Pricing and Cost Advice

"It's a monthly cost with Elastic SIEM, but I am not sure of the exact cost."
"I can say that the product is cheaply priced."
"The base product is open-source but if you need advanced security features then you need to pay for the subscription. Elastic Security's price is reasonable in some cases and in other cases it's not."
"The licensing cost of Elastic Security is based on the daily ingestion rate. I can't recall the exact figure, but for 10GB of log action daily, it would cost around $20,000."
"We use the open-source version, so there is no charge for this solution."
"There is no charge for using the open-source version."
"It is easy to deploy, easy to use, and you get everything you need to become operational with it, and have nothing further to pay unless you want the OLED plugin."
"Elastic Stack is an open-source tool. You don't have to pay anything for the components."
"Syslog-ng is a free open-source solution."
"Syslog-ng is open-source."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
884,656 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Government
9%
Comms Service Provider
9%
Manufacturing Company
7%
Government
11%
Financial Services Firm
9%
Computer Software Company
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business40
Midsize Enterprise11
Large Enterprise15
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise3
 

Questions from the Community

Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
I am satisfied with the pricing, setup cost, and licensing cost. It is a pure 10.
What needs improvement with syslog-ng?
We currently do not use that feature. We currently have just an open-source release, not a premium release. My boss has indicated that he wants to buy a premium syslog-ng version next month. I thin...
What is your primary use case for syslog-ng?
In Italy, we have to be compliant with the Garante for privacy. We have to log every login, logout, or login failure made by a system administrator. We store all syslog data of the infrastructure. ...
What advice do you have for others considering syslog-ng?
When it comes to parsing, I can parse both structured and unstructured data, though our data are only structured. Currently, we collect all data we receive as raw data. Each file is stored for each...
 

Also Known As

Elastic SIEM, ELK Logstash
No data available
 

Overview

 

Sample Customers

Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Tecnocom, University of Victoria, University of Exeter, Datapath
Find out what your peers are saying about Elastic Security vs. syslog-ng and other solutions. Updated: March 2026.
884,656 professionals have used our research since 2012.