Graylog vs USM Anywhere
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog provides the edge in Threat Detection & Incident Response across diverse attack surfaces.
Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog...
Deployment
- Cloud-based
- On-premise
Support Options
- Chat
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across...
Deployment
- Cloud-based
- On-premise
Support Options
- Chat
Images
Pricing
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
US$1,075.00/month
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.1/ 5Features
4.4/ 5Customer Service
4.3/ 5Value for Money
4.7/ 5Ease of Use
4.4/ 5Features
4.4/ 5Customer Service
4.3/ 5Value for Money
4.1/ 5Features
Total features 44
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Application Security
- Archiving & Retention
- Asset Discovery
- Asset Tagging
- Audit Management
- Audit Trail
- Behavioral Analytics
- Charting
- Compliance Tracking
- Customizable Reports
- Dashboard Creation
- Data Analysis Tools
- Data Visualization
- Email Alerts
- Endpoint Management
- Event Logs
- File Integrity Monitoring
- Incident Management
- Intrusion Detection System
- Log Analysis Software
- Log Collection
- Log Management
- Log Parsing
- Log Rotation
- Network Monitoring
- Network Scanning
- PCI Assessment
- Patch Management
- Prioritization
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remediation Management
- Reporting/Analytics
- Risk Analysis
- Role-Based Permissions
- Runtime Container Security
- Search/Filter
- Sensitive Data Identification
- Server Logs
- Server Monitoring
- Single Sign On
- Third-Party Integrations
- Threat Intelligence
- Threshold Alerts
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web-Application Security
Total features 25
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Application Security
- Archiving & Retention
- Asset Discovery
- Asset Tagging
- Audit Management
- Audit Trail
- Behavioral Analytics
- Charting
- Compliance Tracking
- Customizable Reports
- Dashboard Creation
- Data Analysis Tools
- Data Visualization
- Email Alerts
- Endpoint Management
- Event Logs
- File Integrity Monitoring
- Incident Management
- Intrusion Detection System
- Log Analysis Software
- Log Collection
- Log Management
- Log Parsing
- Log Rotation
- Network Monitoring
- Network Scanning
- PCI Assessment
- Patch Management
- Prioritization
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remediation Management
- Reporting/Analytics
- Risk Analysis
- Role-Based Permissions
- Runtime Container Security
- Search/Filter
- Sensitive Data Identification
- Server Logs
- Server Monitoring
- Single Sign On
- Third-Party Integrations
- Threat Intelligence
- Threshold Alerts
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web-Application Security