

Logpoint and Wazuh are competitors in the security information and event management (SIEM) market. Logpoint seems to have the upper hand due to its comprehensive solution combining SIEM and SOAR capabilities, especially in environments that require robust integration and automation.
Features: Logpoint focuses on log collection, advanced analytics, and offers quick parser creation, along with integration with various security products. Wazuh shines as an open-source solution with features like EDR capabilities, vulnerability assessments, and a comprehensive compliance framework.
Room for Improvement: Logpoint could enhance dashboard customization and memory optimization while expanding its cloud-native capabilities. Wazuh requires improvements in threat intelligence, scalability, and AI/ML features for better automation and detection.
Ease of Deployment and Customer Service: Logpoint is mainly on-premise with some hybrid cloud support, needing technical expertise for setup. Its customer service is responsive but can improve in initial engagement. Wazuh offers flexible deployment but relies heavily on community support, which could be less comprehensive than Logpoint’s dedicated support.
Pricing and ROI: Logpoint has a fixed pricing model, making it expensive for advanced features, though it offers measurable ROI through compliance and operational flexibility. Wazuh, being open-source, offers a lower entry cost. The total cost can increase with additional support, but it remains a cost-effective option for those needing open-source adaptability.
I have seen value in security cost savings with Wazuh, as using proprietary EDR versions could save us substantial money.
Logpoint's customer support is not sufficient with only one engineer in the US.
The technical support for Logpoint is very good, and I would rate it as nine out of ten.
I recommend a submission to Logpoint because I worked with it before.
They responded quickly, which was crucial as I was on a time constraint.
We use the open-source version of Wazuh, which does not provide paid support.
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
It is web-based and accommodates the expansion of our organization.
Logpoint is scalable and capable of expanding.
It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
Currently, I don't see any limitations in terms of scalability as Wazuh can still connect many endpoints.
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate.
I have received reports indicating glitches and downtimes with Logpoint.
The stability of Wazuh is strong, with no issues stemming from the solution itself.
The stability of Wazuh is largely dependent on maintenance.
The indexer frequently times out, requiring system restarts.
Dealing with foreign entities for support was a challenge, leading us to switch providers due to lack of adequate support.
Logpoint needs to be cloud-native, as currently, it is not.
Logpoint's UEBA is a weak point, while Exabeam's UEBA has extra AI through automation.
Machine learning is needed along with understanding user behavior and behavioral patterns.
The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub.
I think Wazuh should improve by introducing AI functionalities, as it would be beneficial to see AI incorporated in the threat hunting and detection functionalities.
I rate the pricing at eight, suggesting it's relatively good or affordable.
Wazuh is completely free of charge.
I would definitely recommend Wazuh, especially considering Fortinet's licensing model which is confusing and overpriced in my opinion.
Totaling around two lakh Indian rupees per month.
The UEBA enables us to monitor at the device level, and SOAR provides playbooks and templates that we can modify and incorporate into the platform.
It effectively facilitates logging and log storage and assists in security event management by ingesting security events.
The most valuable feature, which is endpoint security, is included in Logpoint, and an extra feature is the integration.
Wazuh is a SIEM tool that is highly customizable and versatile.
The system allows us to monitor endpoints effectively and collect security data that can be utilized across other platforms such as SOAR.
With this open source tool, organizations can establish their own customized setup.
| Product | Mindshare (%) |
|---|---|
| Wazuh | 4.6% |
| Logpoint | 1.2% |
| Other | 94.2% |

| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 27 |
| Midsize Enterprise | 15 |
| Large Enterprise | 8 |
Logpoint offers a robust SIEM system tailored for compliance with regulations like PCI DSS and GDPR, enhancing security monitoring and enabling efficient incident response.
Logpoint strengthens cybersecurity by offering essential tools for log collection, security monitoring, and forensic analysis. Its features include an intuitive dashboard, a powerful correlation engine, and extensive third-party integrations, making it a versatile asset for security operations centers. Despite its advantages, areas for improvement include ransomware protection, cloud-native deployment, and more flexible pricing. Improvements in features like SOAR and UEBA functionality can boost its competitiveness.
What are the most important features of Logpoint?Many organizations utilize Logpoint across industries as part of their security infrastructure. It supports standard compliance, orchestrating incident responses and security threat monitoring. Logpoint empowers businesses by integrating and correlating security data, improving cybersecurity posture in varied environments.
Wazuh offers an open-source platform designed for seamless integration into diverse environments, making it ideal for enhancing security infrastructure. Its features include log monitoring, compliance support, and real-time threat detection, providing effective cybersecurity management.
Wazuh stands out for its ability to integrate easily with Kubernetes, cloud-native infrastructures, and various SIEM platforms like ELK. It features robust MITRE ATT&CK correlation, comprehensive log monitoring capabilities, and detailed reporting dashboards. Users benefit from its file integrity monitoring and endpoint detection and response (EDR) capabilities, which streamline compliance and vulnerability assessments. While appreciated for its customization and easy deployment, room for improvement exists in scalability, particularly in the free version, and in areas such as threat intelligence integration, cloud integration, and container security. The platform is acknowledged for its strong documentation and technical support.
What are the key features of Wazuh?In industries like finance, healthcare, and technology, Wazuh is utilized for its capabilities in log aggregation, threat detection, and vulnerability management. Companies often implement its features to ensure compliance with stringent regulations and to enhance security practices across cloud environments. By leveraging its integration capabilities, organizations can achieve unified security management, ensuring comprehensive protection of their digital assets.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.