Learn More

Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 383 Ratings

Total
ease
features
design
support

Description

Today's top edge cloud platform empowers developers, connects with customers, and grows your business. Our edge cloud platform is designed to enhance your existing technology and teams. Our edge cloud platform moves data and applications closer towards your users -- at a network's edge -- to improve the performance of your websites and apps. Fastly's highly-programmable CDN allows you to personalize delivery right at the edge. Your users will be delighted to have the content they need at their fingertips. Our powerful POPs are powered by solid-state drives (SSDs), and are located in well-connected locations around world. They allow us to keep more content in cache for longer periods of time, resulting in fewer trips back to the source. Instant Purge and batch purging using surrogate keys allow you to cache and invalidate dynamic content in a matter of minutes. You can always serve up current headlines, inventory, and weather forecasts.

Description

Graylog is the AI-powered SIEM and log management platform built to help security and IT operations teams work faster, stay focused, and stay in control. It brings together all your event data in one place so teams can detect real threats quickly, investigate efficiently, and manage data costs predictably—without compromise. Graylog’s explainable AI turns noise into clarity, highlighting what matters most and guiding analysts through consistent, confident response steps. Its open, flexible architecture adapts to any environment, empowering organizations to scale and evolve without being locked into rigid systems or unpredictable pricing. With Graylog Security, Enterprise, API Security, and Open, more than 60,000 organizations worldwide rely on Graylog to deliver faster insight, simpler operations, and a smarter path to SIEM without compromise.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Claroty
Coralogix
Enso
Fastly Next-Gen WAF
Google Workspace
Hanabi.rest
JupiterOne
Khan Academy
Kubernetes
NXLog
Palo Alto Networks DNS Security Service
SMSEagle
Sophos Central Device Encryption
StatusGator
ThreatBlockr
Threater
Trapster
Upstash
Vantage
Zoho Directory

Integrations

Claroty
Coralogix
Enso
Fastly Next-Gen WAF
Google Workspace
Hanabi.rest
JupiterOne
Khan Academy
Kubernetes
NXLog
Palo Alto Networks DNS Security Service
SMSEagle
Sophos Central Device Encryption
StatusGator
ThreatBlockr
Threater
Trapster
Upstash
Vantage
Zoho Directory

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$1250/month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Fastly

Founded

2011

Country

United States

Website

fastly.com

Vendor Details

Company Name

Graylog

Founded

2009

Country

United States

Website

graylog.org

Product Features

CDN

Content Acceleration
DDoS Protection
Load Balancing
Managed CDN
Multi-CDN Switching
Reporting/Analytics
Software Downloads
Transparent Caching
Video Streaming
Web Application Firewalls (WAF)

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Product Features

API Security

Graylog empowers security teams by providing comprehensive insights across logs, events, and API interactions, which are crucial for identifying threats, examining incidents, and executing precise responses. With Graylog Enterprise, organizations can manage logs at scale, utilizing robust search capabilities, alert systems, and correlation features to speed up root cause investigations. Building upon this foundation, Graylog Security introduces enhanced threat detection, ready-to-use content for prevalent attack methods, and seamless integration with Security Operations Centers (SOCs). Meanwhile, Graylog API Security enhances oversight of the increasingly important API landscape by automatically discovering APIs, pinpointing sensitive data vulnerabilities, and detecting data breaches in real time. Collectively, the Graylog platform offers integrated, cost-effective security operations and API safeguarding—available both on-premises and in cloud environments—enabling teams to effectively identify, investigate, and address critical security issues.

Cybersecurity

Graylog is a cutting-edge log management and SIEM platform harnessing the power of AI, specifically designed to meet the needs of security teams in real-world scenarios. It aggregates logs and security information from cloud, on-premises, and hybrid setups, empowering teams to identify threats more quickly, conduct thorough investigations, and manage data expenses—all while avoiding vendor lock-in. This platform merges scalable log management with effective, understandable AI, which helps minimize alert fatigue, highlight genuine risks, and facilitate investigations from identification to resolution. Through selective data ingestion and smart data tiering, Graylog ensures that SIEM expenses remain manageable, while its built-in detection capabilities, correlation functions, threat intelligence, and guided workflows enable lean teams to work effectively. Offering adaptable deployment options, open integrations, and targeted solutions for Security Operations, IT Operations, and API Security, Graylog provides organizations with enhanced visibility, accelerated response times, and full control over their data—without the added complexity.

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security

Graylog serves as a comprehensive platform for centralized log management and IT security, empowering teams to confidently monitor, investigate, and safeguard intricate environments. It aggregates and analyzes log data from a variety of sources, including servers, applications, networks, and cloud infrastructure, providing real-time insights into security vulnerabilities, configuration errors, and operational threats. Engineered for optimal efficiency, Graylog minimizes unnecessary data with standardized information, focused alerts, and structured workflows, enabling IT and security personnel to quickly grasp ongoing situations and respond accordingly. Its versatile deployment options allow for on-premises, cloud, and hybrid solutions, while selective data ingestion and smart tiered storage help maintain predictable costs related to storage and licensing. Featuring open integrations, built-in dashboards, and robust search capabilities, Graylog enhances visibility for IT teams, accelerates troubleshooting, and fortifies security—without introducing complexity or dependence on a single vendor.

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Log Analysis

Graylog converts unprocessed log data into valuable insights. By standardizing and enhancing information from various systems, it enables teams to identify trends, recognize irregularities, and comprehend the narratives behind events as they unfold. With its user-friendly search capabilities, customizable dashboards, and AI-driven summaries, Graylog simplifies the process of identifying root causes, recognizing potential issues, and confirming solutions—without the need to learn a specific query language or sift through irrelevant information. Whether addressing performance challenges, tracking system availability, or probing security breaches, Graylog facilitates quicker decision-making and minimizes resolution time. The outcome is swifter insights, fewer overlooked issues, and increased assurance that all systems are functioning optimally and securely.

Log Management

Graylog consolidates and scrutinizes event and log data from intricate environments, equipping IT and security teams with essential insights to identify problems, probe incidents, and uphold compliance standards. In contrast to conventional tools that require compromises between affordability, scalability, and speed, Graylog streamlines the processes of log collection, storage, and searching through an intuitive onboarding experience, built-in data parsing, and a budget-friendly data lake that allows users to access only the necessary information. This cohesive methodology aids teams in swiftly identifying issues, minimizing cloud-related expenses, and ensuring readiness for audits—eliminating the burden of complicated setups and unpredictable costs. It offers comprehensive log management without sacrifices.

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Log Monitoring

Graylog integrates ongoing log surveillance with interpretable AI, providing IT, DevOps, and security professionals with instantaneous insights and enhanced visibility in intricate environments. It aggregates logs from various cloud, on-premises, and hybrid platforms, employing AI-generated summaries and anomaly detection to focus on key issues—be it a performance glitch, a deployment failure, or a security concern. Equipped with customizable dashboards, alert thresholds, and guided remediation options, teams can swiftly transition from receiving alerts to taking action. Graylog’s AI capability helps filter out unnecessary noise, pinpoint root causes, and maintain a stable, secure, and compliant infrastructure—offering seamless log monitoring without any trade-offs.

Security Orchestration, Automation and Response (SOAR)

Graylog improves the efficiency of Security Orchestration, Automation, and Response (SOAR) processes by incorporating automation and guided remediation directly within the SIEM, while still maintaining the functionality of specialized SOAR platforms. Its integrated features facilitate swift responses through AI-guided remediation steps, incident management, and threat intelligence connections. Event Procedures offer standardized guidance, while automated tasks manage alerts, data lookups, and evidence gathering. Security analysts are equipped with actionable insights through consolidated analytics and smooth integrations, minimizing false positives and reducing manual labor. This leads to quicker, more dependable investigations and enhanced collaboration throughout the entire security framework.

SIEM

Graylog empowers security and IT professionals to navigate the vast amounts of data generated within their environments every moment. As a comprehensive SIEM and log management solution, Graylog aggregates, standardizes, and connects event data from various sources, whether on-premises, in the cloud, or across hybrid systems. With the ability to swiftly visualize activities, identify irregularities, and probe potential threats through AI-enhanced summaries, structured response workflows, and adaptable dashboards, analysts gain valuable insights. This enhanced clarity eliminates excessive alerts and transforms unrefined data into actionable intelligence. For organizations striving to optimize resources amidst limited teams and budgets, Graylog is essential, offering full visibility, expedited investigations, and predictable pricing—providing a SIEM experience that meets the highest standards.

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

User and Entity Behavior Analytics (UEBA)

Graylog Security integrates artificial intelligence, machine learning, and behavioral analysis to empower teams in identifying and addressing threats that conventional rules often overlook. Its User and Entity Behavior Analytics (UEBA) continuously evolves by learning the typical behaviors of users, hosts, and applications, allowing it to adjust to emerging behaviors and risks. By connecting anomalies with log data, asset information, and threat intelligence, Graylog effectively identifies significant threats—like insider threats or credential misuse—while minimizing false alarms. The platform's AI-driven summarization and structured investigation processes provide analysts with clear insights and expedite the triage process, enabling them to translate intricate data into prompt, informed decisions.

Alternatives

Fluentd Reviews

Fluentd

Fluentd Project
Queue-it Reviews

Queue-it

Queue-it ApS
Grafana Loki Reviews

Grafana Loki

Grafana