Graylog vs Cytellix
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog provides the edge in Threat Detection & Incident Response across diverse attack surfaces.
Graylog elevates cybersecurity and IT operations through its comprehensive SIEM, Centralized Log Management, and API Security solutions. Graylog...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
No images available
Pricing
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.1/ 5Features
4.4/ 5Customer Service
4.3/ 5Value for Money
4.7/ 5Features
Total features 44
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Application Security
- Archiving & Retention
- Assessment Management
- Audit Management
- Audit Trail
- Behavior Tracking
- Behavioral Analytics
- Charting
- Cloud Application Security
- Cloud Security Policy Management
- Compliance Management
- Compliance Tracking
- Customizable Reports
- DDoS Protection Software
- Dashboard Creation
- Data Analysis Tools
- Data Visualization
- Email Alerts
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Firewalls
- Incident Management
- Intrusion Detection System
- Log Analysis Software
- Log Collection
- Log Management
- Log Parsing
- Log Rotation
- Monitoring
- Network Monitoring
- Penetration Testing
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remediation Management
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Search/Filter
- Security Auditing
- Server Logs
- Server Monitoring
- Single Sign On
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Threshold Alerts
- User Management
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Traffic Reporting
Total features 53
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Application Security
- Archiving & Retention
- Assessment Management
- Audit Management
- Audit Trail
- Behavior Tracking
- Behavioral Analytics
- Charting
- Cloud Application Security
- Cloud Security Policy Management
- Compliance Management
- Compliance Tracking
- Customizable Reports
- DDoS Protection Software
- Dashboard Creation
- Data Analysis Tools
- Data Visualization
- Email Alerts
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Firewalls
- Incident Management
- Intrusion Detection System
- Log Analysis Software
- Log Collection
- Log Management
- Log Parsing
- Log Rotation
- Monitoring
- Network Monitoring
- Penetration Testing
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remediation Management
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Search/Filter
- Security Auditing
- Server Logs
- Server Monitoring
- Single Sign On
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Threshold Alerts
- User Management
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Traffic Reporting