Introducing G2.ai, the future of software buying.Try now

Compare Logpoint and Wazuh - The Open Source Security Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Logpoint
Logpoint
Star Rating
(108)4.3 out of 5
Market Segments
Mid-Market (45.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at €20.00 1 Employees Per Month
Browse all 3 pricing plans
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Star Rating
(63)4.5 out of 5
Market Segments
Small-Business (47.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Wazuh - The Open Source Security Platform

Logpoint vs Wazuh - The Open Source Security Platform

When assessing the two solutions, reviewers found Wazuh - The Open Source Security Platform easier to use and administer. However, reviewers preferred the ease of set up, and doing business with Logpoint overall.

  • Reviewers felt that Wazuh - The Open Source Security Platform meets the needs of their business better than Logpoint.
  • When comparing quality of ongoing product support, reviewers felt that Logpoint is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Logpoint over Wazuh - The Open Source Security Platform.
Pricing
Entry-Level Pricing
Logpoint
SaaS SIEM+SOAR
Starting at €20.00
1 Employees Per Month
Browse all 3 pricing plans
Wazuh - The Open Source Security Platform
No pricing available
Free Trial
Logpoint
No trial information available
Wazuh - The Open Source Security Platform
No trial information available
Ratings
Meets Requirements
8.4
78
8.8
46
Ease of Use
8.3
79
8.6
46
Ease of Setup
8.2
64
7.9
27
Ease of Admin
8.0
60
8.6
27
Quality of Support
9.0
72
8.2
44
Has the product been a good partner in doing business?
8.7
60
8.4
22
Product Direction (% positive)
9.2
76
8.9
44
Features by Category
7.7
33
Not enough data
Visibility
8.0
30
Not enough data
8.0
29
Not enough data
7.9
28
Not enough data
Monitoring and Management
7.4
24
Not enough data
7.2
23
Not enough data
7.8
26
Not enough data
Agentic AI - Log Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.8
44
Not enough data
Data Preparation
7.7
40
Not enough data
8.1
37
Not enough data
7.8
39
Not enough data
7.4
36
Not enough data
Analysis
7.5
36
Not enough data
7.6
37
Not enough data
7.8
36
Not enough data
8.3
41
Not enough data
8.4
41
Not enough data
7.5
33
Not enough data
Visualization
7.8
41
Not enough data
7.9
37
Not enough data
Agentic AI - Log Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Detection and Response (NDR)Hide 11 FeaturesShow 11 Features
8.5
7
Not enough data
Analysis
8.6
7
Not enough data
9.3
7
Not enough data
Not enough data
Not enough data
7.1
7
Not enough data
Response
8.8
7
Not enough data
8.3
7
Not enough data
8.3
7
Not enough data
Detection
8.6
7
Not enough data
8.1
7
Not enough data
9.3
7
Not enough data
Services - Network Detection and Response (NDR)
Not enough data
Not enough data
Application SecurityHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
SAP Security SoftwareHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - SAP Security Software
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - SAP Security Software
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
7.8
12
Not enough data
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
7.9
7
Not enough data
8.1
8
Not enough data
7.1
8
Not enough data
7.9
8
Not enough data
Detection
8.1
8
Not enough data
7.9
8
Not enough data
7.7
8
Not enough data
Not enough data
Not enough data
Agentic AI - SAP Store
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
8.5
17
Not enough data
Orchestration
8.6
12
Not enough data
8.6
14
Not enough data
9.0
13
Not enough data
7.8
9
Not enough data
Information
8.8
13
Not enough data
8.7
14
Not enough data
8.6
12
Not enough data
Personalization
8.8
10
Not enough data
8.6
11
Not enough data
7.8
9
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Threat Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.5
25
7.9
26
Response
8.2
16
7.9
24
8.8
14
7.9
23
8.6
11
7.8
22
8.4
15
8.4
24
Records
8.7
21
9.0
24
8.7
19
8.1
24
8.3
20
7.9
22
Management
8.6
21
8.7
23
8.3
15
7.9
21
8.2
17
7.9
21
Generative AI
Not enough data
7.0
10
Not enough data
6.7
10
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
7.7
53
Not enough data
Network Management
8.2
43
Not enough data
7.4
39
Not enough data
8.6
48
Not enough data
Incident Management
8.1
42
Not enough data
7.8
40
Not enough data
7.9
42
Not enough data
Security Intelligence
7.7
42
Not enough data
7.4
38
Not enough data
7.9
41
Not enough data
8.0
42
Not enough data
Agentic AI - Security Information and Event Management (SIEM)
6.0
5
Not enough data
7.7
5
Not enough data
8.0
5
Not enough data
7.7
5
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Orchestration, Automation, and Response (SOAR)Hide 11 FeaturesShow 11 Features
8.9
17
Not enough data
Automation
8.5
8
Not enough data
8.9
9
Not enough data
8.5
8
Not enough data
9.2
11
Not enough data
Orchestration
9.1
11
Not enough data
8.9
11
Not enough data
8.9
9
Not enough data
9.1
11
Not enough data
Response
9.5
11
Not enough data
8.7
10
Not enough data
8.5
8
Not enough data
Categories
Categories
Shared Categories
Logpoint
Logpoint
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Logpoint and Wazuh - The Open Source Security Platform are categorized as Incident Response
Reviews
Reviewers' Company Size
Logpoint
Logpoint
Small-Business(50 or fewer emp.)
30.8%
Mid-Market(51-1000 emp.)
45.2%
Enterprise(> 1000 emp.)
24.0%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Small-Business(50 or fewer emp.)
47.5%
Mid-Market(51-1000 emp.)
37.7%
Enterprise(> 1000 emp.)
14.8%
Reviewers' Industry
Logpoint
Logpoint
Computer & Network Security
17.3%
Information Technology and Services
15.4%
Government Administration
9.6%
Information Services
4.8%
Security and Investigations
3.8%
Other
49.0%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Information Technology and Services
39.3%
Computer & Network Security
19.7%
Computer Software
9.8%
Security and Investigations
4.9%
Hospital & Health Care
4.9%
Other
21.3%
Alternatives
Logpoint
Logpoint Alternatives
Datadog
Datadog
Add Datadog
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sumo Logic
Sumo Logic
Add Sumo Logic
Microsoft Sentinel
Microsoft Sentinel
Add Microsoft Sentinel
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Datadog
Datadog
Add Datadog
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
CrowdSec
CrowdSec
Add CrowdSec
Discussions
Logpoint
Logpoint Discussions
Monty the Mongoose crying
Logpoint has no discussions with answers
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Discussions
What is Wazuh - The Open Source Security Platform used for?
1 Comment
Nikhil D.
ND
We use wazuh in Amazon AWS to monitor virtual machines and cloud instances. Apart from it it can be used for endpoint security, we just need to install an...Read more
Monty the Mongoose crying
Wazuh - The Open Source Security Platform has no more discussions with answers