Introducing G2.ai, the future of software buying.Try now

Compare Logpoint and Wazuh - The Open Source Security Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Logpoint
Logpoint
Star Rating
(108)4.3 out of 5
Market Segments
Mid-Market (45.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at €20.00 1 Employees Per Month
Browse all 3 pricing plans
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Star Rating
(60)4.5 out of 5
Market Segments
Small-Business (45.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Wazuh - The Open Source Security Platform
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Logpoint excels in Quality of Support with a score of 9.1, indicating that many find their customer service responsive and helpful. In contrast, Wazuh's support quality is rated lower at 8.2, suggesting that users may experience longer wait times or less effective assistance.
  • Reviewers mention that Logpoint's Alerting feature is highly rated at 9.5, providing users with timely notifications that enhance their security posture. Wazuh, while still effective, has a lower alerting score, which may lead to less immediate awareness of potential threats.
  • G2 users highlight Logpoint's superior Deployment capabilities, scoring 9.1, which suggests a smoother setup process compared to Wazuh's score of 7.9. This difference may be crucial for organizations looking to implement security solutions quickly and efficiently.
  • Users on G2 report that Logpoint's Incident Logs feature is rated at 8.7, providing comprehensive tracking of security events. Wazuh, however, has a higher score of 9.0 in this area, indicating that users may find it more effective for detailed incident tracking and reporting.
  • Reviewers mention that Logpoint's Security Workflow Automation is rated at 8.6, which helps streamline security processes. Wazuh's score of 8.6 in the same category shows it is competitive, but users may find Logpoint's implementation more user-friendly.
  • Users say that Logpoint's Data Visualization capabilities are impressive with a score of 9.1, allowing for better insights into security data. Wazuh's score in this area is not specified, but users may find Logpoint's visual tools more intuitive and effective for monitoring security metrics.
Pricing
Entry-Level Pricing
Logpoint
SaaS SIEM+SOAR
Starting at €20.00
1 Employees Per Month
Browse all 3 pricing plans
Wazuh - The Open Source Security Platform
No pricing available
Free Trial
Logpoint
No trial information available
Wazuh - The Open Source Security Platform
No trial information available
Ratings
Meets Requirements
8.4
78
8.8
44
Ease of Use
8.3
79
8.6
44
Ease of Setup
8.2
64
7.9
25
Ease of Admin
8.0
60
8.6
26
Quality of Support
9.0
72
8.2
42
Has the product been a good partner in doing business?
8.7
60
8.3
21
Product Direction (% positive)
9.2
76
9.2
42
Features by Category
7.7
33
Not enough data
Visibility
8.0
30
Not enough data
8.0
29
Not enough data
7.9
28
Not enough data
Monitoring and Management
7.4
24
Not enough data
7.2
23
Not enough data
7.8
26
Not enough data
Agentic AI - Log Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.8
44
Not enough data
Data Preparation
7.7
40
Not enough data
8.1
37
Not enough data
7.8
39
Not enough data
7.4
36
Not enough data
Analysis
7.5
36
Not enough data
7.6
37
Not enough data
7.8
36
Not enough data
8.3
41
Not enough data
8.4
41
Not enough data
7.5
33
Not enough data
Visualization
7.8
41
Not enough data
7.9
37
Not enough data
Agentic AI - Log Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Detection and Response (NDR)Hide 11 FeaturesShow 11 Features
8.5
7
Not enough data
Analysis
8.6
7
Not enough data
9.3
7
Not enough data
Not enough data
Not enough data
7.1
7
Not enough data
Response
8.8
7
Not enough data
8.3
7
Not enough data
8.3
7
Not enough data
Detection
8.6
7
Not enough data
8.1
7
Not enough data
9.3
7
Not enough data
Services - Network Detection and Response (NDR)
Not enough data
Not enough data
Application SecurityHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
SAP Security SoftwareHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - SAP Security Software
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - SAP Security Software
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
7.8
12
Not enough data
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
7.9
7
Not enough data
8.1
8
Not enough data
7.1
8
Not enough data
7.9
8
Not enough data
Detection
8.1
8
Not enough data
7.9
8
Not enough data
7.7
8
Not enough data
Not enough data
Not enough data
Agentic AI - SAP Store
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
8.5
17
Not enough data
Orchestration
8.6
12
Not enough data
8.6
14
Not enough data
9.0
13
Not enough data
7.8
9
Not enough data
Information
8.8
13
Not enough data
8.7
14
Not enough data
8.6
12
Not enough data
Personalization
8.8
10
Not enough data
8.6
11
Not enough data
7.8
9
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Threat Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.5
25
7.9
23
Response
8.2
16
7.8
23
8.8
14
7.8
22
8.6
11
7.7
21
8.4
15
8.3
23
Records
8.7
21
9.0
23
8.7
19
8.0
23
8.3
20
7.9
22
Management
8.6
21
8.6
22
8.3
15
7.8
20
8.2
17
7.8
20
Generative AI
Not enough data
7.0
10
Not enough data
6.7
10
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
7.7
53
Not enough data
Network Management
8.2
43
Not enough data
7.4
39
Not enough data
8.6
48
Not enough data
Incident Management
8.1
42
Not enough data
7.8
40
Not enough data
7.9
42
Not enough data
Security Intelligence
7.7
42
Not enough data
7.4
38
Not enough data
7.9
41
Not enough data
8.0
42
Not enough data
Agentic AI - Security Information and Event Management (SIEM)
6.0
5
Not enough data
7.7
5
Not enough data
8.0
5
Not enough data
7.7
5
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Orchestration, Automation, and Response (SOAR)Hide 11 FeaturesShow 11 Features
8.9
17
Not enough data
Automation
8.5
8
Not enough data
8.9
9
Not enough data
8.5
8
Not enough data
9.2
11
Not enough data
Orchestration
9.1
11
Not enough data
8.9
11
Not enough data
8.9
9
Not enough data
9.1
11
Not enough data
Response
9.5
11
Not enough data
8.7
10
Not enough data
8.5
8
Not enough data
Categories
Categories
Shared Categories
Logpoint
Logpoint
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Logpoint and Wazuh - The Open Source Security Platform are categorized as Incident Response
Reviews
Reviewers' Company Size
Logpoint
Logpoint
Small-Business(50 or fewer emp.)
30.8%
Mid-Market(51-1000 emp.)
45.2%
Enterprise(> 1000 emp.)
24.0%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Small-Business(50 or fewer emp.)
45.8%
Mid-Market(51-1000 emp.)
39.0%
Enterprise(> 1000 emp.)
15.3%
Reviewers' Industry
Logpoint
Logpoint
Computer & Network Security
17.3%
Information Technology and Services
15.4%
Government Administration
9.6%
Information Services
4.8%
Security and Investigations
3.8%
Other
49.0%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Information Technology and Services
39.0%
Computer & Network Security
18.6%
Computer Software
10.2%
Security and Investigations
5.1%
Hospital & Health Care
5.1%
Other
22.0%
Alternatives
Logpoint
Logpoint Alternatives
Datadog
Datadog
Add Datadog
Sumo Logic
Sumo Logic
Add Sumo Logic
Splunk Enterprise
Splunk Enterprise
Add Splunk Enterprise
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Datadog
Datadog
Add Datadog
SentinelOne Singularity
SentinelOne
Add SentinelOne Singularity
CrowdSec
CrowdSec
Add CrowdSec
Discussions
Logpoint
Logpoint Discussions
Monty the Mongoose crying
Logpoint has no discussions with answers
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Discussions
What is Wazuh - The Open Source Security Platform used for?
1 Comment
Nikhil D.
ND
We use wazuh in Amazon AWS to monitor virtual machines and cloud instances. Apart from it it can be used for endpoint security, we just need to install an...Read more
Monty the Mongoose crying
Wazuh - The Open Source Security Platform has no more discussions with answers