

Devo and Wazuh are key players in the security solutions industry, each offering unique strengths. Devo appears to have the upper hand in feature richness and speed, while Wazuh excels with its cost-effectiveness and integration capabilities.
Features:Devo’s standout features include Activeboards for querying and visualizing data, real-time analytics, and robust data management capabilities enhanced by integrations like CyberChef. It facilitates complex correlation and detection rules, proving invaluable for security operations. Wazuh shines with its easy integration, open-source flexibility, and features such as risk assessment and straightforward implementation.
Room for Improvement:Devo faces challenges with unexpected pricing related to metadata parsing, needing better integration with pre-built monitoring applications and broader SaaS integrations. In contrast, Wazuh exhibits limitations in scalability, documentation, and lacks advanced features like built-in threat intelligence and AI capabilities. Users report that manual configuration is often necessary for more refined use cases.
Ease of Deployment and Customer Service:Devo offers flexible deployment options suitable for cloud and hybrid environments, coupled with professional customer service. However, its setup can be complex and sometimes slow in response during onboarding. Wazuh is efficient for users comfortable with open-source practice, though it requires improvements in documentation and technical assistance as it mostly relies on community support.
Pricing and ROI:Devo's licensing model, centered on data ingestion, can result in higher costs due to metadata charges, affecting ROI. Despite this, its advanced features offer long-term value. Wazuh's open-source nature provides unmatched initial cost savings, ideal for organizations with budget constraints, though sustained maintenance and additional capabilities may incur further effort and investment.
I have seen value in security cost savings with Wazuh, as using proprietary EDR versions could save us substantial money.
They responded quickly, which was crucial as I was on a time constraint.
We use the open-source version of Wazuh, which does not provide paid support.
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
Currently, I don't see any limitations in terms of scalability as Wazuh can still connect many endpoints.
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate.
The stability of Wazuh is strong, with no issues stemming from the solution itself.
The stability of Wazuh is largely dependent on maintenance.
The indexer frequently times out, requiring system restarts.
This is particularly evident when dealing with failed login attempts and determining true versus false positives.
Machine learning is needed along with understanding user behavior and behavioral patterns.
The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub.
I think Wazuh should improve by introducing AI functionalities, as it would be beneficial to see AI incorporated in the threat hunting and detection functionalities.
Wazuh is completely free of charge.
I would definitely recommend Wazuh, especially considering Fortinet's licensing model which is confusing and overpriced in my opinion.
Totaling around two lakh Indian rupees per month.
When they see a spike in a line chart for a failed login, which could be a true or false attempt, they can click that spike, and a table widget on the same active board instantly populates with raw logs of data for those specific failed logins.
Wazuh is a SIEM tool that is highly customizable and versatile.
The system allows us to monitor endpoints effectively and collect security data that can be utilized across other platforms such as SOAR.
With this open source tool, organizations can establish their own customized setup.
| Product | Mindshare (%) |
|---|---|
| Wazuh | 5.8% |
| Devo | 1.1% |
| Other | 93.1% |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 4 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 27 |
| Midsize Enterprise | 15 |
| Large Enterprise | 8 |
Devo is the only cloud-native logging and security analytics platform that releases the full potential of all your data to empower bold, confident action when it matters most. Only the Devo platform delivers the powerful combination of real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO crucial for monitoring and securing business operations as enterprises accelerate their shift to the cloud.
Wazuh offers an open-source platform designed for seamless integration into diverse environments, making it ideal for enhancing security infrastructure. Its features include log monitoring, compliance support, and real-time threat detection, providing effective cybersecurity management.
Wazuh stands out for its ability to integrate easily with Kubernetes, cloud-native infrastructures, and various SIEM platforms like ELK. It features robust MITRE ATT&CK correlation, comprehensive log monitoring capabilities, and detailed reporting dashboards. Users benefit from its file integrity monitoring and endpoint detection and response (EDR) capabilities, which streamline compliance and vulnerability assessments. While appreciated for its customization and easy deployment, room for improvement exists in scalability, particularly in the free version, and in areas such as threat intelligence integration, cloud integration, and container security. The platform is acknowledged for its strong documentation and technical support.
What are the key features of Wazuh?In industries like finance, healthcare, and technology, Wazuh is utilized for its capabilities in log aggregation, threat detection, and vulnerability management. Companies often implement its features to ensure compliance with stringent regulations and to enhance security practices across cloud environments. By leveraging its integration capabilities, organizations can achieve unified security management, ensuring comprehensive protection of their digital assets.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.