linkedin
background
Wazuh logo

Wazuh

Brand: Wazuh

Be the first to Reviews

Write a Review

Have Questions?

img

Get Free Expert Consultation

Let us know your business needs clearly

Advice

Verified & Trusted
Vendors

Payment

Safe & Secure
Payment

Guaranteed

Personalized
Experts Support

Price On Request

Features

  • check_icon Advanced Threat Detection
  • check_icon Log Data Analysis
  • check_icon File Integrity Monitoring
  • check_icon Vulnerability Detection
  • check_icon Configuration Assessment
  • See all img

Wazuh Pricing & Plans

Wazuh price is available on request

Looking for pricing details, customization requirements or have other queries? We are just a click away.

Get Wazuh Demo

We make it happen! Get your hands on the best solution based on your needs.

Interacted

Wazuh Features

  • icon_check Advanced Threat Detection Continuously identifies malicious activities across endpoints and networks using advanced behavioral and signature analysis.
  • icon_check Log Data Analysis Collects, normalizes, and analyzes logs from multiple sources to detect anomalies, threats, and compliance violations.
  • icon_check File Integrity Monitoring Monitors critical system files and directories for unauthorized changes that may indicate tampering or compromise attempts.
  • icon_check Vulnerability Detection Scans systems to detect known vulnerabilities in software packages and configurations for timely risk mitigation actions.
  • icon_check Configuration Assessment Evaluates system settings against security baselines and compliance standards to maintain secure infrastructure states.
  • icon_check Intrusion Detection Detects intrusion attempts using signature-based and anomaly-based methods to identify and alert on malicious behavior.
  • icon_check Security Incident Response Automates alerting and enables rapid response workflows for detected security incidents to minimize potential damage.
  • icon_check Compliance Monitoring Ensures adherence to regulatory standards like PCI DSS, HIPAA, and GDPR through automated auditing and reporting.
  • icon_check Malware Detection Identifies and alerts on potential malware infections using signature databases and heuristic behavioral analysis techniques.
  • icon_check Endpoint Security Management Provides centralized visibility and control over endpoint security events and configurations across all connected devices.
  • icon_check Cloud Security Monitoring Offers visibility into cloud environments such as AWS, Azure, and GCP for detecting misconfigurations and threats.
  • icon_check Real-Time Alerting Generates immediate alerts for suspicious or policy-violating activities to enable proactive threat containment measures.
  • icon_check Dashboard and Visualization Provides customizable dashboards with visual metrics and analytics for monitoring security posture in real time.
  • icon_check API and Integrations Supports RESTful APIs and third-party integrations with tools like Splunk, PagerDuty, and TheHive for extended automation.
  • icon_check Agent-Based Architecture Utilizes lightweight agents deployed on endpoints to collect, process, and send security data to centralized Wazuh servers.

Wazuh Specifications

  • Supported Platforms :
  • Device:
  • Deployment :
  • Suitable For :
  • Business Specific:
  • Business Size:
  • Customer Support:
  • Integration:
  • Training:
  • Language:
  • Windows MacOS Linux
  • Desktop
  • Web-Based, Perpetual
  • All Industries
  • All Businesses
  • Small Business, Startups, Medium Business, Enterprises
  • Phone, Email, Communities
  • API Integration
  • Webinars, Videos
  • English

Wazuh Reviews and Ratings

banner

Would you like to review this product?

Submit Reviews

Wazuh Company Details

Brand Name Wazuh
Information The Open Source Security Platform.
Founded Year 2015
Director/Founders Santiago Bassett
Company Size 101-500 Employees