Graylog Features

Summary of Features

Network Management

  • Activity Monitoring
  • Asset Management
  • Log Management

Incident Management

  • Event Management
  • Automated Response
  • Incident Reporting

Security Intelligence

  • Threat Intelligence
  • Vulnerability Assessment
  • Advanced Analytics
  • Data Examination

Filter for Features

Network Management

Activity Monitoring

Based on 46 Graylog reviews and verified by the G2 Product R&D team. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
86%
(Based on 46 reviews)

Asset Management

Based on 40 Graylog reviews and verified by the G2 Product R&D team. Keeps records of each network asset and its activity. Discovers new assets accessing the network.
74%
(Based on 40 reviews)

Log Management

Based on 54 Graylog reviews and verified by the G2 Product R&D team. Provides security information and stores the data in a secure repository for reference.
91%
(Based on 54 reviews)

Incident Management

Event Management

Based on 48 Graylog reviews and verified by the G2 Product R&D team. Alerts users of incidents and allows users to intervene manually or triggers an automated response.
84%
(Based on 48 reviews)

Automated Response

Based on 42 Graylog reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
n/a

Incident Reporting

Based on 44 Graylog reviews and verified by the G2 Product R&D team. Documents cases of abnormal activity and compromised systems.
79%
(Based on 44 reviews)

Security Intelligence

Threat Intelligence

Based on 44 Graylog reviews and verified by the G2 Product R&D team. Stores information related to common threats and how to resolve them once incidents occur.
75%
(Based on 44 reviews)

Vulnerability Assessment

Based on 40 Graylog reviews and verified by the G2 Product R&D team. Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
75%
(Based on 40 reviews)

Advanced Analytics

Based on 44 Graylog reviews and verified by the G2 Product R&D team. Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
76%
(Based on 44 reviews)

Data Examination

Based on 47 Graylog reviews and verified by the G2 Product R&D team. Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.
83%
(Based on 47 reviews)

Data Preparation

Data Sources

Automatically collect logs from all your services, applications, and platforms

Not enough data available

Indexing

Automate the indexing of machine data that's critical to your operations

Not enough data available

Automated Tagging

See log data in context with automated tagging and correlation

Not enough data available

Data Blending

Mix and match data from apps, hosts, containers, services, networks, and more

Not enough data available

Analysis

Track Trends

Allows user to track log trends.

Not enough data available

Detect Anomalies

Identify and predict anomalies in real-time with outlier detection and uncover root-causes

Not enough data available

Metric and Event Data

Analyze both metric and event data on the same platform regardless of source or structure

Not enough data available

Search

Search your logs for troubleshooting and open-ended exploration of your data

Not enough data available

Alerts

Create alerts based on search patterns, thresholds for specific log metrics, or other conditions

Not enough data available

Live Tail

See your data, in real time, streaming into the system from multiple data sources

Not enough data available

Visualization

Dashboards

Visualize log data on dashboards

Not enough data available

Data Discovery

Drill down and explore data to discover new insights

Not enough data available

Monitoring

Performance Baselines

Not enough data available

Performance Analysis

Not enough data available

Performance Monitoring

Not enough data available

AI/ML Assistance

Not enough data available

Multi-System Monitoring

Not enough data available

Response

Dashboards and Visualization

Not enough data available

Incident Alerting

Not enough data available

Root Cause Analysis (RCA)

Not enough data available

Do you work for Graylog?