The primary use case for Wazuh is the detection of malware.
Informatics Engineering Lecturer at Innovation Center STMIK AMIKOM
Affordable and powerful tool for malware detection
Pros and Cons
- "It is excellent in terms of visualization and indexing services, making it a powerful tool for malware detection."
- "Adding the flexibility to integrate various plug-ins or modules into its core system would enhance functionality."
What is our primary use case?
What is most valuable?
It is excellent in terms of visualization and indexing services, making it a powerful tool for malware detection. It is easy to install, configure, and run, requiring minimum resource investment, even for small-scale deployments on personal devices.
What needs improvement?
Improving the abilities related to security threat mapping, such as threat map landscape visualization, would be a great benefit. Adding the flexibility to integrate various plug-ins or modules into its core system would enhance functionality.
For how long have I used the solution?
I have been working with it for two years.
Buyer's Guide
Wazuh
November 2024
Learn what your peers think about Wazuh. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,053 professionals have used our research since 2012.
What do I think about the stability of the solution?
I would rate the stability eight out of ten.
Which solution did I use previously and why did I switch?
I used Azure documentation and report storage, while researching other internet resources to gain a broader perspective on different product capabilities that are available for learning and deployment needs. Wazuh offers excellent features.
What's my experience with pricing, setup cost, and licensing?
When I contacted customer care, they mentioned bundling options, that I found to be overall affordable.
What other advice do I have?
I would recommend this product to other users in the field of cybersecurity. It provides enhanced network security and many useful features. It is easy to use, with a pricing structure that is more affordable compared to other options. I would rate it eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Principal Architect at Calsoft
The pile integrity monitoring features are solid, but log analysis could be improved.
Pros and Cons
- "The configuration assessment and Pile integrity monitoring features are decent."
- "Log data analysis could be improved. My IT team has been looking for an alternative because they want better log data for malware detection. We are also doing more container implementation also, so we need better container security, log data analysis, auditing and compliance, malware detection, etc."
What is our primary use case?
Our primary use case for Wazuh is monitoring endpoints. The second is incident management. Logging is essential for us because of Indian IT compliance rules require us to store logs for 180 days. We need to monitor and maintain logs also.
Wazuh is monitoring around 1,200 inputs, but there are only about four or five members of the IT team directly using the solution.
What is most valuable?
The configuration assessment and pile integrity monitoring features are decent.
What needs improvement?
Log data analysis could be improved. My IT team has been looking for an alternative because they want better log data for malware detection. We are also doing more container implementation also, so we need better container security, log data analysis, auditing and compliance, malware detection, etc.
Overall, the implementation part of Azure is tricky. It can be simplified and automated more to shorten the deployment timeline, so we can immediately onboard the application. The entire implementation process should be user-friendly.
For how long have I used the solution?
We implemented Wazuh in 2019.
What do I think about the stability of the solution?
I rate Wazuh six out of 10 for stability. While we haven't seen any incidents lately, it used to crash a few years back. The dashboard would be inaccessible due to some service failure or something.
What do I think about the scalability of the solution?
I rate Wazuh eight out of 10 for scalability.
How are customer service and support?
We use community forums like Stack Overflow to find answers. Most debugging and troubleshooting processes are readily available online.
How was the initial setup?
Setting up Wazuh is complex. The deployment involved two IT engineers and took about two months
What about the implementation team?
We deployed Wazuh.
What's my experience with pricing, setup cost, and licensing?
Wazuh is a free solution.
Which other solutions did I evaluate?
We tried to replace Wazuh with a CrowdStrike real-time security solution. We also tried some solutions from one of our vendors We want to move to either Elastic or CrowdStrike.
What other advice do I have?
I rate Wazuh six out of 10. It's a solid open-source. Stability-wise, Wazuh seems to have fixed all the past issues, and the latest version is possibly the most stable. However, they need to add more features to keep up with the competition. Compared to products like Elastic, Wazuh still lacks a lot of in-depth information. It's still not possible to do a dive, and the configuration could be easier.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Wazuh
November 2024
Learn what your peers think about Wazuh. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,053 professionals have used our research since 2012.
Software Engineer at a computer software company with 1,001-5,000 employees
Good for file integrity monitoring
Pros and Cons
- "Wazuh offers numerous features, such as the ability to define custom rules for detecting malicious activities and remembering behaviors."
- "The only challenge we faced with Wazuh was the lack of direct support."
What is our primary use case?
We are using Wazuh for security information and event management, PCI DSS compliance, auditing, real-time sensitive monitoring, and meeting regulatory requirements.
How has it helped my organization?
There were certain tasks we couldn't carry out before. However, with Wazuh, we found a solution within a single platform. It only required a one-time effort to set up and configure the version. After that, it's just about monitoring the alerts and making revisions. No additional efforts are needed.
What is most valuable?
The most valuable features include file integrity monitoring, Wazuh engines, Wazuh rulesets (including rulesets for Apache and firewall routers), and vulnerability detection.
What needs improvement?
There is room for improvement in Wazuh, but it's possible they are already working on it. The only challenge we faced with Wazuh was the lack of direct support. They charge for support, whether it's five days a week or seven days a week. We don't expect it to be free because revenue is generated through the support they provide.
In future releases, I would like to see a feature. There is one feature we observed in a premium tool in the industry called Dynatrace. It provides automatic relations between different devices and components. For instance, if you receive a web login request, Dynatrace can trace and show you the path it takes from the firewall to the switch, then to the Apache server, the actual job application, and finally back to the client. It intelligently correlates all the components involved in a single event.
If Wazuh could include this feature, where all the components are integrated, it would automatically relate them for any activity in your environment.
For how long have I used the solution?
We have been working with Wazuh for the last year. We currently use the latest version.
What do I think about the stability of the solution?
Sometimes, it has disturbances, but at the end of the day, it's not Wazuh but, actually, the configurations that engineers do sometimes do not have compatibility. So at that time, we face issues, but as of now, Wazuh has not disappointed us in any way.
What do I think about the scalability of the solution?
It is scalable. We can add a new machine or server, install the components, and inform the other components about its IP address. We add it to the cluster, and a restart of the cluster is all that's needed to integrate the new component.
While there are many people involved, only three or four security engineers manage and oversee the events collected and provided by Wazuh.
Which solution did I use previously and why did I switch?
We used Splunk primarily for log management purposes. There were no extra security modules or playbooks involved. We indexed the logs, built dashboards, generated reports, and set up alerts. That was the extent of our usage, without any additional security features.
How was the initial setup?
The initial setup was not complex. We had prior experience with Elastic and Elk, so the deployment of Wazuh was quite familiar to us. It wasn't a major challenge.
However, we do need maintenance as we need to upgrade the version periodically. During maintenance, we have to switch off all the endpoints, turn off all the components, and then power off one by one to upgrade them to the latest version. This is done during a maintenance window.
One or two engineers are usually enough to handle the maintenance tasks.
What about the implementation team?
In terms of the deployment plan, if we exclude the endpoints (monitored servers), we have multiple nodes for each component: indexer, manager, and dashboard. We also implemented an NGINX-based load balancer, following the documentation provided by Wazuh on configuring NGINX as a load balancer. This helps in load disturbance and redundancy, so we don't have a single point of failure when any server goes down.
The deployment process took approximately one to two weeks to fully test and deploy the system. We had to spend time on research and development to properly configure everything. The resources mainly involved Linux servers. There were not many additional resources involved beyond that.
Which other solutions did I evaluate?
We evaluated LogRhythm, which is an excellent intelligence-based tool. However, it comes with a high cost for the intelligence features. Wazuh lacks AI or machine learning capabilities, but otherwise, it has all the necessary capabilities for a similar solution.
What other advice do I have?
I would advise you to carefully follow the documentation. It is straightforward and to the point. If any issues arise, the Wazuh Slack community is highly active and responsive. They can provide assistance within 24 hours or even less, helping with any deployment or management challenges.
Wazuh offers numerous features, such as the ability to define custom rules for detecting malicious activities and remembering behaviors. Unlike some paid tools, Wazuh is extensive and extendible and allows integration with open-source tools and scripts. It is flexible, reliable, and open-source, which is its biggest advantage.
Overall, it is a good solution. I would rate the solution a nine out of ten. Considering that Wazuh is open source and free of cost while providing all the necessary features, I would rate it nine or ten. I lean towards ten because it offers a comprehensive solution without any financial burden. However, compared to industry leaders like LogRhythm and Splunk, which have machine learning modules, Wazuh lacks in that aspect. So, overall, I would rate it nine, but because of its cost-effectiveness, it deserves a ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Dec 16, 2024
Flag as inappropriateChief Operating Officer at PT. Visionet Data Internasional
Cost-effective solution with robust stability for threat detection and compliance
Pros and Cons
- "Its cost-effectiveness is the most valuable aspect."
- "The support team could be more responsive and provide quicker replies during our working hours in Indonesia, which would be a significant improvement."
What is our primary use case?
We use it as a cost-effective solution for our customers who are in the initial stages of adopting security measures. Many of these customers are new to security practices and are primarily seeking compliance with regulations.
What is most valuable?
Its cost-effectiveness is the most valuable aspect.
What needs improvement?
There is room for improvement in terms of simplifying the deployment process. In addition, it would be beneficial if Wazuh focused on expanding its offensive modules as the primary enhancement. Another valuable development would be the introduction of a Security Orchestration, Automation, and Response capability. It could work on further developing its threat intelligence offerings as the third priority.
For how long have I used the solution?
I have been using it for two years.
What do I think about the stability of the solution?
We haven't faced any issues or challenges regarding its stability.
How are customer service and support?
One of the challenges we face in Indonesia is the time zone difference when seeking support. The support team could be more responsive and provide quicker replies during our working hours in Indonesia, which would be a significant improvement.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
I have experience with IBM QRadar. The key distinction between them and Wazuh is the presence of additional modules in IBM QRadar that are not found in Wazuh. IBM QRadar provides Security Orchestration Automation and Response capabilities, while Wazuh does not offer this feature.
How was the initial setup?
The initial setup is relatively smooth and typically takes approximately one week to complete.
What about the implementation team?
For the deployment process, I usually allocate one or two individuals. The first person is an infrastructure engineer, and the second is a Wazuh administrator. The deployment process involves several phases. The initial step is the assessment phase, where we evaluate the customer's assets, such as the number and types of assets and the specific logs they want to send. The second step involves implementing the assessment data and configuring it in the Wazuh engine. After completing the implementation, we move to the third phase, which focuses on operational tasks. In cases where a customer has new assets and there are no existing templates for parsing the data, our team needs to manually create these parsing templates. I would rate it six out of ten.
What's my experience with pricing, setup cost, and licensing?
It is a cost-effective solution.
What other advice do I have?
When customers prioritize enhanced security and rapid cyberattack detection, and they have a more substantial budget to work with, I typically recommend IBM QRadar. For customers who are still in the early stages of security adoption, Wazuh is my preferred suggestion. It is a suitable choice for smaller companies, as larger organizations, particularly those in the financial industry, tend to have more experienced and knowledgeable security teams. Overall, I would rate it eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Founder & CEO at AGILLY
A stable solution with an intuitive interface that enables users to search logs easily
Pros and Cons
- "The product’s interface is intuitive."
- "The implementation is very complex."
What is most valuable?
Most of our customers are satisfied with the product. The product’s interface is intuitive. We can search logs very easily.
What needs improvement?
The implementation is very complex.
For how long have I used the solution?
We are resellers of the product.
What do I think about the stability of the solution?
The tool is stable. We had issues later when the storage space was full. We had to change the location of the logs because the customer did not point the logs to the right storage. I rate the tool’s stability an eight out of ten.
What do I think about the scalability of the solution?
The scalability might be a challenge since we use the on-premise version. The system crashed when the disc was full of log data. It was a challenge. In our customer’s organization, 50 people are using the product.
How are customer service and support?
Our customers get technical support from us. They do not receive support from Wazuh.
How was the initial setup?
We need very skilled staff to implement the tool.
What about the implementation team?
The implementation took two to three weeks. Configuring the log collector from the servers was not very simple. Sometimes, we need to write some scripts and find specific assets. It is not a fully integrated solution. We need to set up three different elements. We needed three people to deploy the product. Our customers need only two people to maintain the tool.
What's my experience with pricing, setup cost, and licensing?
It is an open-source product. Apart from the implementation cost, our customers do not have to pay for the license.
What other advice do I have?
I was not directly involved in the implementation process. I was supervising the team. We did not try to integrate the tool with other security products. Our customers wanted to integrate it with Active Directory. They also wanted to collect logs from a feature service. I know that the product has a cloud version. The problems we face with the on-premise version might be solved on the cloud version. People looking to use the product must be ready to learn and study the product. It is not easy to handle.
Overall, I rate the product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Cybersecurity specialist at a manufacturing company with 51-200 employees
A product that offers good integration capabilities to its users
Pros and Cons
- "The product is easy to customize."
- "The tool does not provide CTI to monitor darknet."
What is our primary use case?
My company uses Wazuh in our lab environment, where we have 100 endpoints.
What needs improvement?
The tool does not provide CTI to monitor darknet. In the future, I want the tool to provide CTI to monitor the darknet so that by creating a single query, I can monitor the darknet.
For how long have I used the solution?
I have been using Wazuh for a year. I am an end user of the solution.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a five or six out of ten.
My company has a problem with the stability of the product because we don't have a high-availability architecture. The fact that my company does not have a high availability architecture might be our company's problem.
What do I think about the scalability of the solution?
Around three security operators in my company use the product.
Though I want the use of the product to be increased in the company, the decision to do so lies in the hands of the management.
How are customer service and support?
I have not contacted the tool's support team. If my company contacts the product's support team, it would be easier for our company to deal with the product's areas like deployment and usage. In the upcoming year, I would like to use the commercial tech support offered by the product.
Which solution did I use previously and why did I switch?
Previously, I have used IBM QRadar, SentinelOne, and Splunk, which were all very expensive products.
My company started to use Wazuh considering its low prices compared to other solutions.
How was the initial setup?
I rate the product's initial setup phase an eight or nine on a scale of one to ten, where one is difficult, and ten is easy. Wazuh is a very simple tool.
The solution is deployed on a private cloud.
It is difficult to comment on how much time is required to deploy the product since there is always a need to add new log sources and integration. The solution can be deployed in a few days so that the testing phase can be carried out.
What's my experience with pricing, setup cost, and licensing?
Wazuh is a cheaply priced product.
What other advice do I have?
The product has been implemented in my company's environment for threat direction straight out of the box through a simple implementation process.
My company uses the product for threat detection and to create and tune playbooks with roles. My company uses the product in our lab environment, so it's not used for production, which makes it easier for us to deal with the tuning part of the product.
The product helps our company's ability to comply with industry standards since we use the CIS benchmark for hardening GDPR compliance.
My company uses the product for event analysis. My company uses Wazuh as a SIEM solution.
My company uses the product for many of our use cases, and we also deal with the configuration part of the tool. My company is trying to tune the product, and it is possible to use it for event analysis with Wazuh. The product is effective in terms of event analysis.
The integration capabilities of the product with other tools, like FortiGate and NetFlow, are good.
More time is required for me to be able to see how the product's scalability can impact our company's environment.
The product is easy to customize. The product provides good setup documentation regarding the language to be used to use the product's customization abilities. The product offers a good level of documentation along with a good online community. On the internet, it is easier to get information about any problem or issue users face with the tool.
I recommend the product be used in a team with fewer members for security operations. The tool can be used if you work in areas like security and administration, where it can be easily used and implemented.
I rate the tool an eight out of ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Systems Engineer at a insurance company with 201-500 employees
Easy to deploy in many environments, but it needs to strengthen key features like threat intelligence
Pros and Cons
- "The main thing I like about it is that it has an EDR."
- "I have yet to find the same capability in Wazuh to get logs from different sources into the system"
What is our primary use case?
Wazuh is very good. It offers the ability to measure and benchmark your environment to one of the standards. We installed it on the customer's premises and benchmarked it against CIS controls. We are not in a big environment, and we haven't tested Wazuh for long.
What is most valuable?
The main thing I like about it is that it has an EDR. Other than that, I like that it allows us to benchmark against the standard. It even suggests ways to improve things. Wazuh helps us to research how we can meet the benchmark.
What I also like about Wazuh is that you can deploy the agents in Linux and Unix environments, such as HP, IBM, and Oracle servers. Those servers use UX and AIX environments. The solution has Solaris agents, too. It has agents for all platforms.
What needs improvement?
I have yet to find the same capability in Wazuh to get logs from different sources into the system. I haven't been able to explore that.
There are many functions I want to add. For example, I want to get feeds from different places through threat intelligence. If the feature is there, it needs to be matured. Threat intelligence is key to the use case I've deployed the solution for. It would be good if Wazuh correlated it with the internal and external feeds. Integrating Wazuh with other platforms is a key aspect.
For how long have I used the solution?
I recently started using Wazuh. It's been about two months.
What do I think about the stability of the solution?
I rate Wazuh's stability a seven out of ten. It's stable. It's been working so far, and I have no reason to complain.
What do I think about the scalability of the solution?
We have 20 endpoints on Wazuh and two or three administrators for now managing the solution.
Which solution did I use previously and why did I switch?
I used an old SIEM before Wazuh. Wazuh is more stable. I preferred Wazuh because it's open source. The old SIEM is closing in on the product, though.
How was the initial setup?
The initial setup is really simple. It took three hours to deploy Wazuh.
What about the implementation team?
I implemented Wazuh myself since I'm an experienced administrator.
What's my experience with pricing, setup cost, and licensing?
We use the free version of Wazuh. We will eventually move on to the commercial version.
Which other solutions did I evaluate?
I did some research, but I didn't test. The research was based on user opinions. I saw that most people have tested Wazuh. You can easily get resources online to help you to use the product. Wazuh is getting more popular. If you have a problem, you are not on your own.
Another solution we evaluated was Security Onion, but it was based on a platform that may be at the end of its life, which is Linux Red Hat. Linux Red Hat seems to be on shaky ground, and we don't know where it's headed. We wanted something that provides a roadmap that is not ending soon.
What other advice do I have?
We're still in a test phase with Wazuh. I'm testing integration with the tools that other tools that we are using in a clustered environment. We can adapt the solution on the way forward.
I rate Wazuh a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Director of Engineering - Information Security at Apna
Offers endpoint aberration detection and whitelisting capability
Pros and Cons
- "We use it to find any aberration in our endpoint devices. For example, if someone installs a game on their company laptop, Wazuh will detect it and inform us of the unauthorized software or unintended use of the devices provided by the company."
- "Since it's an open-source tool, scalability is the main issue."
What is our primary use case?
We use it to find any aberration in our endpoint devices. For example, if someone installs a game on their company laptop, Wazuh will detect it and inform us of the unauthorized software or unintended use of the devices provided by the company.
So it can detect more than just games. You can customize it to detect specific software. We have a whitelist of approved software, and Wazuh compares it with the software installed on the device. If there are any mismatches, it reports it to us. So, for instance, we can whitelist Facebook, Blackboard, and YouTube.
What needs improvement?
Since it's an open-source tool, scalability is the main issue. We haven't paid for it, so if we want to scale it, we would need to purchase the enterprise version, which can be quite expensive. So scalability and limited support are the main limitations of the free version.
For how long have I used the solution?
We started in December, so it has been six months now. We are using the open-source version of Wazuh.
What do I think about the scalability of the solution?
Eight of us in the security team are using Wazuh.
How are customer service and support?
We are not allowed to contact the support team on a one-on-one basis in the free version. However, we can post our queries in the community forum, where other users share their experiences and provide assistance.
How was the initial setup?
The initial setup was pretty straightforward. They provide documentation that guides us through the process.
We are using the cloud version. We have deployed it on GCP (Google Cloud Platform).
What's my experience with pricing, setup cost, and licensing?
So if budget is not an issue, you should consider other options. And if you want to save costs, the open-source or Wazuh enterprise would be suitable.
Wazuh is a good tool, but the open-source version has scalability limitations.
What other advice do I have?
If you have the budget, I would suggest looking into other options. However, if you want to secure your endpoints without significant investment, Wazuh is a good tool. Just keep in mind that it may not scale well beyond a few thousand devices.
I would rate the open-source version as five out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Wazuh Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Log Management Security Information and Event Management (SIEM) Extended Detection and Response (XDR)Popular Comparisons
Splunk Enterprise Security
Dynatrace
Datadog
IBM Security QRadar
Elastic Security
Elastic Observability
Graylog
Sumo Logic Security
LogRhythm SIEM
Grafana Loki
Security Onion
Fortinet FortiAnalyzer
syslog-ng
Devo
Amazon CloudWatch
Buyer's Guide
Download our free Wazuh Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between SIEM and Next-Gen SIEM solutions?
- When evaluating Log Management tools and software, what aspect do you think is the most important to look for?
- Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
- Which Windows event log monitoring tool do you recommend?
- What is the difference between log management and SIEM?
- Splunk vs. Elastic Stack
- How can Cloudtrail logs be used effectively to improve log monitoring?
- Why hot data and cold data differences in SIEM solutions are not discussed sufficiently?
- When evaluating Log Management solutions, what aspect do you think is the most important to look for?
- When evaluating Log Management solutions, what aspects do you think are the most important to look for?