
| Product | Market Share (%) |
|---|---|
| Wazuh | 8.3% |
| Splunk Enterprise Security | 8.0% |
| IBM Security QRadar | 6.0% |
| Other | 77.7% |
| Type | Title | Date | |
|---|---|---|---|
| Category | Security Information and Event Management (SIEM) | Dec 30, 2025 | Download |
| Product | Reviews, tips, and advice from real users | Dec 30, 2025 | Download |
| Comparison | Wazuh vs Splunk Enterprise Security | Dec 30, 2025 | Download |
| Comparison | Wazuh vs Microsoft Sentinel | Dec 30, 2025 | Download |
| Comparison | Wazuh vs IBM Security QRadar | Dec 30, 2025 | Download |
| Title | Rating | Mindshare | Recommending | |
|---|---|---|---|---|
| CrowdStrike Falcon | 4.3 | 3.6% | 97% | 136 interviewsAdd to research |
| Datadog | 4.3 | N/A | 97% | 209 interviewsAdd to research |
Wazuh's most valued attributes include MITRE ATT&CK correlation, seamless integration with environments, effective SIEM features, ELK for investigations, PCI DSS compliance, cloud-native infrastructure, monitoring, vulnerability assessment, active response, and scalability. Users appreciate open-source accessibility, ease of deployment, comprehensive compliance capabilities, customizable dashboards, and robust documentation. Wazuh excels in threat hunting, CVE management, intrusion detection, and enhancing endpoint security. Community support and cost-effectiveness enhance its appeal for many organizations.
| Company Size | Count |
|---|---|
| Small Business | 23 |
| Midsize Enterprise | 12 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 1897 |
| Midsize Enterprise | 1069 |
| Large Enterprise | 2402 |
Wazuh offers an open-source platform designed for seamless integration into diverse environments, making it ideal for enhancing security infrastructure. Its features include log monitoring, compliance support, and real-time threat detection, providing effective cybersecurity management.
Wazuh stands out for its ability to integrate easily with Kubernetes, cloud-native infrastructures, and various SIEM platforms like ELK. It features robust MITRE ATT&CK correlation, comprehensive log monitoring capabilities, and detailed reporting dashboards. Users benefit from its file integrity monitoring and endpoint detection and response (EDR) capabilities, which streamline compliance and vulnerability assessments. While appreciated for its customization and easy deployment, room for improvement exists in scalability, particularly in the free version, and in areas such as threat intelligence integration, cloud integration, and container security. The platform is acknowledged for its strong documentation and technical support.
What are the key features of Wazuh?In industries like finance, healthcare, and technology, Wazuh is utilized for its capabilities in log aggregation, threat detection, and vulnerability management. Companies often implement its features to ensure compliance with stringent regulations and to enhance security practices across cloud environments. By leveraging its integration capabilities, organizations can achieve unified security management, ensuring comprehensive protection of their digital assets.
Wazuh was previously known as Wazuh All-In-One Deployment.
| Author info | Rating | Review Summary |
|---|---|---|
| Engineer - Information Security at N-Able (Pvt) Ltd | 4.5 | I prefer Wazuh over Forti due to its better pricing, flexibility, documentation, and dashboard performance, though it lacks AI and user behavior features. Both are stable, but Wazuh's simplicity and community support stand out for me. |
| Security Consultant at ebenezer.okoh@agorasecurity.it | 4.5 | I use Wazuh for daily security operations focused on threat hunting and intrusion detection. The system integrates well with our firewalls. I see room for improvement with AI integration, but overall, it provides cost-effective security solutions. |
| Cyber Security Software Engineer at a tech services company with 11-50 employees | 4.0 | I use Wazuh as a versatile open-source SIEM platform, benefiting from its customizability and cost-saving advantages. Though documentation is comprehensive, improvements are needed in uniformity and developer-friendliness. The platform effectively integrates third-party services and ranks highly for its capabilities. |
| Tech Lead at a tech vendor with 51-200 employees | 3.5 | I've used Wazuh for two years in compromise assessments due to its strong EDR agent capabilities, though I don't recommend it for long-term SOC use because of stability and log retention issues despite easy setup and good visibility. |
| Security Operations Center Analyst at mailbox.org | 4.0 | I use Wazuh as a highly customizable open-source SIEM solution that effectively addresses various client issues. Its valuable CVE helper feature is beneficial, though it requires labor-intensive maintenance due to limited AI integration, needing constant code input. |
| Student at Dakota State University | 3.0 | I am evaluating Wazuh for file monitoring and compliance reporting. Its valuable features include cost-effective alerts and compliance tools, although improvements are needed with rule tags. Wazuh offers potential ROI compared to previous market solutions, especially for small to medium businesses. |
| Software Engineer at i2c Inc. | 4.0 | I use Wazuh in my company mainly as a SIEM and XDR tool. Its most valuable features include SIEM modules, vulnerability detection, and compliance frameworks. However, it lacks AI and ML capabilities and is costly for our infrastructure and log ingestion. |
| Tech Lead at a tech vendor with 201-500 employees | 3.5 | We integrated Wazuh with Google Cloud for data collection and anomaly detection, valuing its MITRE framework mapping. While support and integration need improvement, Wazuh offers a significant ROI by reducing detection and response times compared to previous manual audits. |