Elastic Security vs Wazuh comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 9, 2024
 

Categories and Ranking

Elastic Security
Ranking in Log Management
5th
Ranking in Security Information and Event Management (SIEM)
5th
Ranking in Extended Detection and Response (XDR)
7th
Average Rating
7.6
Number of Reviews
60
Ranking in other categories
Endpoint Detection and Response (EDR) (16th), Security Orchestration Automation and Response (SOAR) (6th)
Wazuh
Ranking in Log Management
2nd
Ranking in Security Information and Event Management (SIEM)
3rd
Ranking in Extended Detection and Response (XDR)
3rd
Average Rating
7.4
Number of Reviews
39
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2024, in the Log Management category, the mindshare of Elastic Security is 4.5%, down from 7.7% compared to the previous year. The mindshare of Wazuh is 18.6%, up from 11.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
Unique Categories:
Security Information and Event Management (SIEM)
7.2%
Endpoint Detection and Response (EDR)
3.6%
Extended Detection and Response (XDR)
15.6%
 

Featured Reviews

CK
Apr 12, 2024
Offers rapid access to data and indexes
Anomaly detection comes into play when conducting a threat investigation using threat intelligence or querying threats. Typically, security events stem from various sources, such as operating system logs, event logs, application logs, and security logs, all collected from different systems and traffic data. This data streams at an enormous rate, measured in events per second, often reaching millions. Therefore, the task involves running anomaly detection across these events to pinpoint those requiring analysis and further threat-hunting efforts. If you're using Kaspersky for event management or passing through data stream pipelines, Elastic can convert the data into a usable format for ingestion into the cluster. Integration with existing solutions is straightforward since Elastic is an open-source platform. Overall, I rate the solution an eight out of ten.
AKASH MAJUMDER - PeerSpot reviewer
Mar 20, 2023
Open-source platform with custom alerting
There are three key strengths of Wazuh that stand out to me. Firstly, Wazuh offers an enhanced HDR version that outperforms the Elastic Stack. Wazuh has achieved this by running a config or a sec in the background, which has improved the XBR for endpoint security significantly. Secondly, Wazuh comes with built-in frameworks, such as the NISC and ISO, that make it easy to comply with various industry standards. We didn't need to configure any custom frameworks for this, as Wazuh had it built in. Lastly, Wazuh has the ability to collect terabytes of data within seconds, which is a crucial feature for modern enterprises dealing with large amounts of data.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Elastic is straightforward, easy to integrate, and highly customizable."
"The most valuable feature is the ability to collect authentication information from service providers."
"The solution is compatible with the cloud-native environment and they can adapt to it faster."
"Enables monitoring of application performance and the ability to predict behaviors."
"The most valuable feature of Elastic Security is that you can install agents, and they are not separately licensed."
"I like that it's a SIEM platform. I like that I can sell Elastic Security quickly. Elastic Security has a large community that can support users."
"It is an extremely stable solution. Stability-wise, I rate the solution a ten out of ten."
"The indexes allow you to get your results quickly. The filtering and log passing is the advantage of Logstash."
"Wazuh's most beneficial features for our security needs are flexibility, built-in rules, integration capabilities, and documentation."
"Some of the strengths of Wazuh that stand out for us include its scalability when deployed on Azure, its open-source nature, which allows for customization based on our needs, and its compatibility with various security solutions like threat intelligence platforms."
"I like the features we use, including malware detection, inventory, detection of hidden processes, and activity logs. Inventory is probably the most important feature. It tells us when processes and packages were installed and what they are, which is helpful."
"The configuration assessment and Pile integrity monitoring features are decent."
"One of the most beneficial features of Wazuh, particularly in the context of security needs, is the machine learning data handling capability."
"I like Wazuh because it is a lot like ELK, which I was already comfortable with, so I didn't have to learn from scratch."
"Wazuh has very flexible and robust features."
"The most valuable feature of Wazuh is the ELK for doing an investigation."
 

Cons

"Better integration with third-party APMs would be really good."
"Improvements in Elastic Security could include refining and normalizing queries to make them more user-friendly, enhancing the user experience with better documentation, and addressing any latency issues."
"Elastic Security could improve the documentation. It would help if they were more simple and clean."
"There is room for improvement in the Kibana dashboard and in the asset management for the program."
"There are connectors to gather logs for Windows PCs and Linux PCs, but if we have to get the logs from Syslog then we have to do it manually, and this should be automated."
"They don't provide user authentication and authorisation features (Shield) as a part of their open-source version."
"The solution should generate an automatic product that integrates with ELK Stack to use artificial intelligence."
"I think because we are a cybersecurity company, the thing that can be improved is the prebuilt tools, especially quality. Compared to its competitor, they still have fewer prebuilt security rules. Elastic Security, in terms of generating alerts, cannot group the same products into one another. Even though the alerts are the same, they still generate them one by one. So, it is very noisy in our dashboard. I would like the Elastic Security admin to group all the same alarms into one alarm so that our dashboard is not noisy."
"Scalability is a challenge because it is distributed architecture and it uses Elastic DB. Their Elastic DB doesn't allow open source waste application."
"It would be better if they had a vulnerability assessment plug-in like the one AlienVault has. In the next release, I would like to have an app with an alerting mechanism."
"The support team could be more responsive and provide quicker replies during our working hours in Indonesia, which would be a significant improvement."
"Log data analysis could be improved. My IT team has been looking for an alternative because they want better log data for malware detection. We are also doing more container implementation also, so we need better container security, log data analysis, auditing and compliance, malware detection, etc."
"I think that the next release should be more suitable for large enterprises, because currently they are not because large companies do not rely on open source solutions."
"One area where Wazuh could use some improvement is in its reporting mechanism, especially for high-level management like CSOs and CEOs."
"There's not much I like about Wazuh. Other products I've used were a lot more functional and user friendly. They came with reports and use cases out of the box. We need to configure Wazuh's alerts and monitoring capabilities manually. It'd be nice if we could select from templates and presets for use cases already built and coded."
"Adding the flexibility to integrate various plug-ins or modules into its core system would enhance functionality."
 

Pricing and Cost Advice

"This is an open-source product, so there are no costs."
"We use the open-source version, so there is no charge for this solution."
"The tool's pricing is flexible and comes at unit cost. You don't have to pay for everything."
"Elastic Security is free to use."
"The licensing cost of Elastic Security is based on the daily ingestion rate. I can't recall the exact figure, but for 10GB of log action daily, it would cost around $20,000."
"I can say that the product is cheaply priced."
"The solution is not expensive and costs around ten dollars a month."
"The solution is free."
"Wazuh is an open-source tool, which means it is freely available for use."
"Wazuh is totally free and open source. There are no licensing costs, only support costs if you need them."
"They have a good pricing strategy for market expansion."
"The current pricing is open source."
"The solution's cost is above the average."
"We use the free version of Wazuh."
"It is a free-of-cost solution."
"It is an open-source product."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
793,295 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Financial Services Firm
10%
Government
10%
University
6%
Computer Software Company
17%
Government
7%
Manufacturing Company
7%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
The solution is not expensive and costs around ten dollars a month.
What do you like most about Wazuh?
Integrates with various open-source and paid products, allowing for flexibility in customization based on use cases.
What needs improvement with Wazuh?
I have built some rules that produce duplicate alerts two or three times. Therefore, these rules should be consolidated. Alerts should be specific rather than repeatedly triggered by integrating mu...
What is your primary use case for Wazuh?
We use Wazuh for the onboarding of both Windows and Linux machines, as well as for firewall and SIM configuration. The IP address is automatically blocked if a server has multiple wrong passwords.
 

Also Known As

Elastic SIEM, ELK Logstash
No data available
 

Learn More

 

Overview

 

Sample Customers

Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Information Not Available
Find out what your peers are saying about Elastic Security vs. Wazuh and other solutions. Updated: July 2024.
793,295 professionals have used our research since 2012.