USM Anywhere and Wazuh compete in the security platform category. USM Anywhere has the upper hand in pricing and support, while Wazuh leads in features and flexibility.
Features: USM Anywhere is valued for its comprehensive threat detection, automated response capabilities, and integrated threat intelligence. Wazuh is praised for its extensive integrations, flexibility, and open-source nature.
Room for Improvement: USM Anywhere users need a more intuitive configuration process, enhanced reporting capabilities, and simplified user experience. Wazuh users wish for better documentation, a more streamlined setup process, and improved installation ease.
Ease of Deployment and Customer Service: USM Anywhere is noted for easy and efficient deployment, supported by responsive customer service. Wazuh's deployment is more complex but offers beneficial customization possibilities, with customer service that can be less responsive.
Pricing and ROI: USM Anywhere users find pricing reasonable with notable ROI due to operational efficiencies. Wazuh, being open-source, offers a cost-effective solution but requires more time in customization.
Customers see ROI as they save on staff and other resources.
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
There is no dedicated technical support for Wazuh as it is open source.
We use the open-source version of Wazuh, which does not provide paid support.
USM Anywhere faces scalability issues because of a 60 TB limit.
It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate.
The stability of Wazuh is largely dependent on maintenance.
The stability of Wazuh is strong, with no issues stemming from the solution itself.
There are scalability issues due to a 60 TB limit, which restricts its use for large customers like banks.
The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub.
There is room for improvement by integrating more AI into Wazuh.
An issue I noticed is with tag values in certain rules not functioning properly.
The pricing is amazing and really cheap.
Totaling around two lakh Indian rupees per month.
Since Wazuh is open source, the pricing for support could be applicable to medium-sized companies without much issue.
The 365-day block query is a major feature.
Wazuh is a SIEM tool that is highly customizable and versatile.
Wazuh's most valuable features include file monitoring and compliance reporting, which do not require excessive costs.
We found the MITRE framework mapping and the agent enrollment service to be the most valuable features of Wazuh.
USM Anywhere centralizes security monitoring of networks and devices in the cloud, on premises, and in remote locations, helping you to detect threats virtually anywhere.
Discover
Analyze
Detect
Respond
Assess
Report
Wazuh is an enterprise-ready platform used for security monitoring. It is a free and open-source platform that is used for threat detection, incident response and compliance, and integrity monitoring. Wazuh is capable of protecting workloads across virtualized, on-premises, containerized, and cloud-based environments.
It consists of an endpoint security agent and a management server. Additionally, Wazuh is fully integrated with the Elastic Stack, allowing users the ability to navigate through security alerts via a data visualization tool.
Wazuh Capabilities
Some of Wazuh’s most notable capabilities include:
Wazuh Benefits
Some of the most valued benefits of Wazuh include:
Wazuh Offers
Reviews From Real Users
"It's very easy to integrate Wazuh with other environments, cloud applications, and on-prem applications. So, the advantage is that it's easy to implement and integrate with other solutions." - Robert C., IT Security Consultant at Microlan Kenya Limited
“The MITRE ATT&CK correlation is most valuable.” - Chief Information Security Officer at a financial services firm
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.