

Gigamon Deep Observability Pipeline and Wazuh are competing products in the realm of network visibility and security monitoring. Users find Wazuh to offer superior feature sets and overall satisfaction, while Gigamon's pricing and support services are perceived more favorably.
Features: Gigamon Deep Observability Pipeline focuses on advanced network visibility and traffic analysis with capabilities in application intelligence. It reduces data noise and enhances network traffic transparency. Wazuh excels in threat detection, SIEM capabilities, and provides comprehensive security monitoring. It integrates well with other environments and offers open-source flexibility.
Room for Improvement: Gigamon could enhance its intelligence in traffic flow analysis and offer more affordable solutions for smaller organizations. It also needs to improve its adaptability to different security tools. Wazuh could streamline its deployment process, enhance compliance support especially in regions like ANZ, and improve intelligence in traffic monitoring.
Ease of Deployment and Customer Service: Gigamon's deployment is streamlined with good support materials and direct customer service. Wazuh requires more initial setup knowledge but benefits from comprehensive documentation and a strong community, offering extensive self-help resources.
Pricing and ROI: Gigamon tends to have higher setup costs but provides good ROI in environments valuing network traffic transparency. Wazuh is cost-effective with significant long-term ROI, leveraging its open-source framework making it ideal for budget-conscious organizations looking for comprehensive security solutions.
I have seen value in security cost savings with Wazuh, as using proprietary EDR versions could save us substantial money.
The technical support by Gigamon Deep Observability Pipeline is good because it has a local architect in my area.
They responded quickly, which was crucial as I was on a time constraint.
We use the open-source version of Wazuh, which does not provide paid support.
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
Currently, I don't see any limitations in terms of scalability as Wazuh can still connect many endpoints.
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate.
The stability of Wazuh is strong, with no issues stemming from the solution itself.
The stability of Wazuh is largely dependent on maintenance.
The indexer frequently times out, requiring system restarts.
Machine learning is needed along with understanding user behavior and behavioral patterns.
The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub.
I think Wazuh should improve by introducing AI functionalities, as it would be beneficial to see AI incorporated in the threat hunting and detection functionalities.
Wazuh is completely free of charge.
I would definitely recommend Wazuh, especially considering Fortinet's licensing model which is confusing and overpriced in my opinion.
Totaling around two lakh Indian rupees per month.
The Pipeline's Comprehensive Insights into data flows have helped improve operational efficiency and security.
Wazuh is a SIEM tool that is highly customizable and versatile.
The system allows us to monitor endpoints effectively and collect security data that can be utilized across other platforms such as SOAR.
With this open source tool, organizations can establish their own customized setup.
| Product | Market Share (%) |
|---|---|
| Wazuh | 8.3% |
| Gigamon Deep Observability Pipeline | 0.3% |
| Other | 91.4% |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 27 |
| Midsize Enterprise | 15 |
| Large Enterprise | 8 |
Gigamon Deep Observability Pipeline is a comprehensive network visibility solution that provides real-time insights into network traffic. It offers SSL inspection and mobile network monitoring for traffic monitoring purposes. The solution optimizes networks, aids in security inspection, and improves firewall performance. It is praised for its performance, power, straightforward integration, stability, and ease of initial setup.
With Gigamon, organizations can gain complete visibility into their network traffic, identify potential threats, and take proactive measures to prevent them. The solution is ideal for organizations of all sizes, including enterprises, service providers, and government agencies.
Wazuh offers an open-source platform designed for seamless integration into diverse environments, making it ideal for enhancing security infrastructure. Its features include log monitoring, compliance support, and real-time threat detection, providing effective cybersecurity management.
Wazuh stands out for its ability to integrate easily with Kubernetes, cloud-native infrastructures, and various SIEM platforms like ELK. It features robust MITRE ATT&CK correlation, comprehensive log monitoring capabilities, and detailed reporting dashboards. Users benefit from its file integrity monitoring and endpoint detection and response (EDR) capabilities, which streamline compliance and vulnerability assessments. While appreciated for its customization and easy deployment, room for improvement exists in scalability, particularly in the free version, and in areas such as threat intelligence integration, cloud integration, and container security. The platform is acknowledged for its strong documentation and technical support.
What are the key features of Wazuh?In industries like finance, healthcare, and technology, Wazuh is utilized for its capabilities in log aggregation, threat detection, and vulnerability management. Companies often implement its features to ensure compliance with stringent regulations and to enhance security practices across cloud environments. By leveraging its integration capabilities, organizations can achieve unified security management, ensuring comprehensive protection of their digital assets.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.