Graylog vs Exabeam
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog provides the edge in Threat Detection & Incident Response across diverse attack surfaces.
Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Exabeam is an analytics and automation solution for accelerated threat detection. It helps security teams add intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products.
Exabeam is an analytics and automation solution for accelerated threat detection. It helps security teams add intelligence to their existing security...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
US$75,000.00/year
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.1/ 5Features
4.4/ 5Customer Service
4.3/ 5Value for Money
4.7/ 5Ease of Use
4/ 5Features
4.3/ 5Customer Service
3.7/ 5Value for Money
4/ 5Features
Total features 44
- AI/Machine Learning
- API
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Archiving & Retention
- Audit Management
- Audit Trail
- Behavior Tracking
- Behavioral Analytics
- Charting
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Customizable Reports
- Dashboard Creation
- Data Analysis Tools
- Data Import/Export
- Data Visualization
- Diagnostic Tools
- Email Alerts
- Endpoint Management
- Event Logs
- Event Tracking
- File Integrity Monitoring
- HIPAA Compliant
- IOC Verification
- Incident Management
- Intrusion Detection System
- Issue Management
- Log Analysis Software
- Log Collection
- Log Management
- Log Parsing
- Log Rotation
- Monitoring
- Network Monitoring
- PCI Compliance
- Performance Metrics
- Predictive Analytics
- Prioritization
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remediation Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Role-Based Permissions
- Search/Filter
- Secure Data Storage
- Security Auditing
- Server Logs
- Server Monitoring
- Single Sign On
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Threshold Alerts
- Uptime Reporting
- Visual Analytics
- Vulnerability Management
- Workflow Management
Total features 65
- AI/Machine Learning
- API
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Archiving & Retention
- Audit Management
- Audit Trail
- Behavior Tracking
- Behavioral Analytics
- Charting
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Customizable Reports
- Dashboard Creation
- Data Analysis Tools
- Data Import/Export
- Data Visualization
- Diagnostic Tools
- Email Alerts
- Endpoint Management
- Event Logs
- Event Tracking
- File Integrity Monitoring
- HIPAA Compliant
- IOC Verification
- Incident Management
- Intrusion Detection System
- Issue Management
- Log Analysis Software
- Log Collection
- Log Management
- Log Parsing
- Log Rotation
- Monitoring
- Network Monitoring
- PCI Compliance
- Performance Metrics
- Predictive Analytics
- Prioritization
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remediation Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Role-Based Permissions
- Search/Filter
- Secure Data Storage
- Security Auditing
- Server Logs
- Server Monitoring
- Single Sign On
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Threshold Alerts
- Uptime Reporting
- Visual Analytics
- Vulnerability Management
- Workflow Management
Integrations
Not provided by vendor
- Cortex XSOAR
- IBM Security QRadar
- Splunk Enterprise