

Logpoint and Graylog Enterprise compete in the log management category. Logpoint appears to have the upper hand in security orchestration due to its built-in SOAR functionalities, whereas Graylog's strength lies in its scalability and open-source foundation.
Features: Logpoint is recognized for its advanced log collection, AI-powered UEBA, and built-in SOAR functionalities, enhancing its security monitoring and orchestration. It excels at integration with its wide range of third-party support. Graylog Enterprise, with an open-source pedigree, focuses on high-performance log searching, alerting, and real-time data analysis. It offers extensive plugins for effortless integration and a search engine optimized for scalability and large data management.
Room for Improvement: Logpoint could enhance its cloud-native deployment features and improve dashboard customization. Users often struggle with dynamic log format parsing. Graylog Enterprise could better its interface, particularly in visualization and alerting, and offer more robust integrations with simpler process pipeline configurations and rule management.
Ease of Deployment and Customer Service: Logpoint provides on-premises deployment, potentially limiting its appeal to enterprises moving to cloud solutions. Though initial support is strong, advanced assistance is needed in some regions, like the US. Graylog Enterprise supports diverse deployment options, including private and hybrid clouds, catering to various infrastructure needs. Its tech support, while generally reliable, sometimes encounters issues typical of outsourced services.
Pricing and ROI: Logpoint's fixed pricing model offers predictable budgeting and is favored over variable cost competitors, though additional modules may incur extra costs. Graylog Enterprise provides a free open-source version with certain limitations and a costly enterprise option that might affect larger deployments. Both products promise ROI in compliance and efficiency, but Logpoint's structured cost model is attractive for consistent budgeting.
| Product | Mindshare (%) |
|---|---|
| Graylog Enterprise | 4.1% |
| Logpoint | 0.8% |
| Other | 95.1% |

| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 5 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
Graylog Enterprise, recognized for log collection, real-time search, and enriched data handling, offers an open-source framework that integrates seamlessly with Elasticsearch. Its user-centric interface streamlines data correlation and log aggregation, supporting both backend services and comprehensive monitoring needs.
Graylog Enterprise stands out for its stability and powerful log management capabilities, facilitating efficient log aggregation, real-time updates, and data analytics. Users benefit from its plugin-based alerting, user-friendly interface, and support for microservices, including Docker integration. The ability to search in detail, flexible API integration, and data enrichment features are highly valued. Challenges include collector application issues, desired visualization enhancements, and authentication integration improvements. Users seek advancements in UI customization, backup functions, and easier rule creation.
What are Graylog Enterprise's most important features?In industrial use, Graylog Enterprise is crucial for audit trailing in financial sectors, facilitating security event identification and error monitoring. Backend teams leverage real-time analytics for swift issue resolution, while developers appreciate the comprehensive log visualization enabled by Docker integration for microservice management.
Logpoint is a cutting-edge security information and event management (SIEM) solution that is designed to be intuitive and flexible enough to be used by an array of different businesses. It is capable of expanding according to its users' needs.
Benefits of Logpoint
Some of the benefits of using Logpoint include:
Reviews from Real Users
Logpoint is a security and management solution that stands out among its competitors for a number of reasons. Two major ones are its data gathering and artificial intelligence (AI) capabilities. Logpoint enables users to not only gather the data, but also to maximize both the amount of data that can be gathered and its usefulness. It removes many of the challenges that users may face in data collection. The solution allows users to set rules for collection and then it pulls information from sources that meet the rules that have been set. This data is then broken into manageable segments and ordered. Users can then analyze these ordered segments with ease. Additionally, LogPoint utilizes both machine learning and AI technology. Users gain the ability to protect themselves from and if necessary resolve emerging threats as soon as they arise. The AI sets security parameters for a user’s system. These act as a baseline that are triggered and notify the user if anything deviates from the rules that it set up.
The chief infrastructure & security officer at a financial services firm writes, “It is a very comprehensive solution for gathering data. It has got a lot of capabilities for collecting logs from different systems. Logs are notoriously difficult to collect because they come in all formats. Logpoint has a very sophisticated mechanism for you to be able to connect to or listen to a system, get the data, and parse it. Logs come in text formats that are not easily parsed because all logs are not the same, but with Logpoint, you can define a policy for collecting the data. You can create a parser very quickly to get the logs into a structured mechanism so that you can analyze them.”
A. Secca., a Cyber Security Analyst at a transportation company, writes, “It is an AI technology because it is using machine learning technology. So far, there is nothing better out there for UEBA in terms of monitoring endpoints and user activity. It is using machine learning language, so it is right at the top. It provides that capability and monitors all of the user’s activities. It devises a baseline and monitors if there is any deviation from the baseline.”
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.