Graylog vs Security Onion comparison

Cancel
You must select at least 2 products to compare!
Graylog Logo
10,226 views|8,623 comparisons
94% willing to recommend
Security Onion Solutions, LLC Logo
3,263 views|2,753 comparisons
66% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Graylog and Security Onion based on real PeerSpot user reviews.

Find out in this report how the two Log Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Graylog vs. Security Onion Report (Updated: April 2024).
769,662 professionals have used our research since 2012.
Featured Review
Andrey Mostovykh
Jörg Kippe
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Storing logs in Elasticsearch means log retrieval is extremely fast, and full text search is available by default.""This had increased productivity for the dev and support teams, because we are directly notifying them.""It is used as a log manager/SIEM. It provides visibility into the infrastructure and security related events.""I like the correlation and the alerting.""We have scaled from a single machine installation (a VM with a Graylog + ES + MongoDB) to (2 Graylog + 2 ES + 3 MongoDB). This was done smoothly with a minimal impact on logging.""The ability to write custom alerts is key to information security and compliance.""The product is scalable. The solution is stable.""Allowing us to set up alerts and integrate with platforms we already use, such as Slack and OpsGenie to alert users of these errors proactively, is also a very useful feature."

More Graylog Pros →

"We use Security Onion for internal vulnerability assessment.""Security Onion is the most mature solution in the market.""The most valuable feature of Security Onion for security monitoring is its ability to find infected ports."

More Security Onion Pros →

Cons
"The biggest problem is the collector application, as we wanted to avoid using Graylog Collector Sidecar due to its architecture.""Its scalability gets complicated when we have to update or edit multiple nodes.""I hope to see improvements in Graylog for more interactivity, user-friendliness, and creating alerts. The initial setup is complex.""Elasticsearch recommendations for tuning could be better. Graylog doesn't have direct support for running the system inside of Kubernetes, so it can be challenging to fill in the gaps and set up containers in a way that is both performant and stable.""With technical support, you are on your own without an enterprise license.""Over six months, I had two similar issues where searches were performed on field "messages". It exhausted all the memory of the ES node causing an ES crash and a Graylog halt.""Dashboards, stream alerts and parsing could be improved.""More customization is always useful."

More Graylog Cons →

"The product is not easy to learn.""Security Onion's user interface could be improved.""The initial setup of the solution is a little bit difficult."

More Security Onion Cons →

Pricing and Cost Advice
  • "Having paid official support is wise for projects."
  • "I am using a community edition. I have not looked at the enterprise offering from Graylog."
  • "If you want something that works and do not have the money for Splunk or QRadar, take Graylog.​​"
  • "​You get a lot out-of-the-box with the non-enterprise version, so give it a try first."
  • "Consider Enterprise support if you have atypical needs or setup requirements.​"
  • "I use the free version of Graylog."
  • "It's an open-source solution that can be used free of charge."
  • "We're using the Community edition."
  • More Graylog Pricing and Cost Advice →

  • "Security Onion is a free solution."
  • "It is an open-source solution."
  • "Security Onion is an open-source solution."
  • More Security Onion Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    769,662 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The product is scalable. The solution is stable.
    Top Answer:We are using the free version of the product. However, the paid version is expensive.
    Top Answer:Since it's a free tool, I don't have much to say. Troubleshooting is important to me. The initial setup is complex. I hope to see improvements in Graylog for more interactivity, user-friendliness, and… more »
    Top Answer:The most valuable feature of Security Onion for security monitoring is its ability to find infected ports.
    Top Answer:Security Onion is an open-source solution. On a scale from one to ten, where ten is expensive and one is cheap, I rate the solution's pricing a six out of ten.
    Top Answer:The initial setup of the solution is a little bit difficult.
    Ranking
    11th
    out of 95 in Log Management
    Views
    10,226
    Comparisons
    8,623
    Reviews
    6
    Average Words per Review
    802
    Rating
    7.3
    33rd
    out of 95 in Log Management
    Views
    3,263
    Comparisons
    2,753
    Reviews
    3
    Average Words per Review
    330
    Rating
    7.7
    Comparisons
    Grafana Loki logo
    Compared 36% of the time.
    Wazuh logo
    Compared 25% of the time.
    syslog-ng logo
    Compared 10% of the time.
    Also Known As
    Graylog2
    Learn More
    Overview

    Graylog is purpose-built to deliver the best log collection, storage, enrichment, and analysis. Graylog is:

    • Considerably faster analysis speeds.
    • More robust and easier-to-use analysis platform.
    • Simpler administration and infrastructure management.
    • Lower cost than alternatives.
    • Full-scale customer service.
    • No expensive training or tool experts required.

    Security Onion is a free and open Linux distribution for threat hunting, enterprise security monitoring, and log management. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
    Security Onion includes a native web interface with built-in tools analysts use to respond to alerts, hunt for evil, catalog evidence into cases, monitor grid performance, and much more. Additionally, third-party tools, such as Elasticsearch, Logstash, Kibana, Suricata, Zeek (formerly known as Bro), Wazuh, Stenographer, CyberChef, NetworkMiner, and many more are included.

    Sample Customers
    Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company16%
    Comms Service Provider11%
    Government8%
    Educational Organization7%
    VISITORS READING REVIEWS
    Computer Software Company13%
    Government11%
    University10%
    Comms Service Provider9%
    Company Size
    REVIEWERS
    Small Business50%
    Midsize Enterprise7%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business32%
    Midsize Enterprise18%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business29%
    Midsize Enterprise19%
    Large Enterprise52%
    Buyer's Guide
    Graylog vs. Security Onion
    April 2024
    Find out what your peers are saying about Graylog vs. Security Onion and other solutions. Updated: April 2024.
    769,662 professionals have used our research since 2012.

    Graylog is ranked 11th in Log Management with 18 reviews while Security Onion is ranked 33rd in Log Management with 3 reviews. Graylog is rated 8.0, while Security Onion is rated 7.6. The top reviewer of Graylog writes "Great detailed search features and easy Java integration, but needs improvement in integration with Python". On the other hand, the top reviewer of Security Onion writes "A mature and affordable solution that is easy to install and easy to update". Graylog is most compared with Grafana Loki, Wazuh, syslog-ng, Splunk Enterprise Security and SolarWinds Kiwi Syslog Server, whereas Security Onion is most compared with Wazuh, Elastic Stack, TheHive, Splunk Enterprise Security and Kali Linux. See our Graylog vs. Security Onion report.

    See our list of best Log Management vendors.

    We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.