Security Event Manager vs Graylog

Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat detection and response management. Key features include event log forwarding, reporting, file integrity, and device monitoring.
Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog provides the edge in Threat Detection & Incident Response across diverse attack surfaces.
Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$5,093.00/one-time

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.7 /5
(9)

Ease of Use

3.9/ 5

Features

4.3/ 5

Customer Service

4.4/ 5

Value for Money

4.4/ 5

Overall rating

4.6 /5
(32)

Ease of Use

4.1/ 5

Features

4.4/ 5

Customer Service

4.3/ 5

Value for Money

4.7/ 5

Total features 46

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Charting
  • Compliance Management
  • Compliance Tracking
  • Customizable Reports
  • Dashboard
  • Dashboard Creation
  • Data Analysis Tools
  • Data Import/Export
  • Data Visualization
  • Email Alerts
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • File Integrity Monitoring
  • HIPAA Compliant
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Intrusion Detection System
  • Log Analysis Software
  • Log Collection
  • Log Management
  • Log Parsing
  • Log Rotation
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • PCI Assessment
  • PCI Compliance
  • Prioritization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Reporting
  • Role-Based Permissions
  • Search/Filter
  • Secure Login
  • Server Logs
  • Server Monitoring
  • Single Sign On
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Management
  • Visual Analytics
  • Vulnerability Management
  • Web Traffic Monitoring

Total features 44

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Charting
  • Compliance Management
  • Compliance Tracking
  • Customizable Reports
  • Dashboard
  • Dashboard Creation
  • Data Analysis Tools
  • Data Import/Export
  • Data Visualization
  • Email Alerts
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • File Integrity Monitoring
  • HIPAA Compliant
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Intrusion Detection System
  • Log Analysis Software
  • Log Collection
  • Log Management
  • Log Parsing
  • Log Rotation
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • PCI Assessment
  • PCI Compliance
  • Prioritization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Reporting
  • Role-Based Permissions
  • Search/Filter
  • Secure Login
  • Server Logs
  • Server Monitoring
  • Single Sign On
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Management
  • Visual Analytics
  • Vulnerability Management
  • Web Traffic Monitoring