Datadog vs Log360

Last Updated:

Our analysts compared Datadog vs Log360 based on data from our 400+ point analysis of SIEM Tools, user reviews and our own crowdsourced data from our free software selection platform.

Datadog Software Tool

Product Basics

Datadog is a comprehensive monitoring and analytics platform designed to empower businesses with real-time insights into their digital infrastructure. This product caters to a broad range of users, from DevOps teams to IT professionals, offering features like infrastructure monitoring, application performance tracking, and log management. Users appreciate Datadog's ability to provide end-to-end visibility, as one user mentions, "Datadog gives us a holistic view of our environment." It allows organizations to proactively identify and resolve issues, enhancing operational efficiency. However, some users note the pricing considerations, stating that "Datadog can get expensive as you scale." The cost can be a limitation for smaller businesses with limited budgets. In terms of performance, Datadog receives praise for its robust features, with users noting that it outperforms similar products. "Datadog is a game-changer," one user states. Overall, Datadog is well-suited for businesses seeking comprehensive monitoring and analytics, and it is seen as a top performer in its category, providing users with valuable insights and real-time monitoring capabilities.
read more...
Log360 is a comprehensive security information and event management (SIEM) solution designed to enhance an organization's cybersecurity posture. It is particularly well-suited for medium and large enterprises seeking to strengthen their security infrastructure. Log360 offers a range of key features, including log management, threat detection, incident response, and compliance reporting. Users have praised its ability to provide real-time threat intelligence and automated incident response. One user stated, "Log360's real-time threat detection has been instrumental in thwarting potential security breaches." However, some users have noted that the pricing structure may be on the higher side. Despite this, they believe that the investment is justified due to the product's robust capabilities. One user commented, "While the pricing may be a consideration, Log360's comprehensive features make it a valuable investment for our organization." Compared to similar products, users find Log360 to be a top choice, citing its ease of use and strong threat detection capabilities. They appreciate its ability to centralize logs and provide actionable insights, making it a vital tool for maintaining a secure IT environment. Overall, Log360 is favored for its contribution to proactively addressing cybersecurity threats.

Pros

  • Robust threat detection
  • Real-time monitoring
  • Incident response automation
  • Centralized log management
  • Comprehensive compliance reporting

Cons

  • Pricing considerations
  • Complex for small businesses
  • Steep learning curve
  • Resource-intensive
  • Integration challenges
read more...
$15/Host, Monthly, Freemium
Get a free price quote
Tailored to your specific needs
$99 Monthly
Get a free price quote
Tailored to your specific needs
Small 
i
Medium 
i
Large 
i
Small 
i
Medium 
i
Large 
i
Windows
Mac
Linux
Android
Chromebook
Windows
Mac
Linux
Android
Chromebook
Cloud
On-Premise
Mobile
Cloud
On-Premise
Mobile
Adobe
Citrix
EA
Facebook
Hearst Magazines
HP
Samsung
Spotify
Cisco
IBM
Northrop Grumman
Symantec

Product Assistance

Documentation
In Person
Live Online
Videos
Webinars
Documentation
In Person
Live Online
Videos
Webinars
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support

Product Insights

  • Comprehensive Monitoring: Datadog offers a wide range of monitoring capabilities, including infrastructure, application performance, and log management. Users benefit from a holistic view of their digital environment, allowing them to identify and resolve issues proactively.
  • Real-Time Insights: With Datadog, users gain access to real-time data and insights. This enables quick responses to performance anomalies and security threats, ensuring business continuity and minimizing downtime.
  • End-to-End Visibility: Datadog provides end-to-end visibility into complex systems. This benefit allows users to track interactions between different components and services, making it easier to pinpoint the root cause of problems.
  • Scalability: Datadog is well-suited for organizations of all sizes. It scales effectively as businesses grow, accommodating the increasing data and monitoring needs without sacrificing performance.
  • Enhanced Collaboration: Datadog promotes collaboration among cross-functional teams, such as DevOps, IT, and development. It allows for shared data and insights, fostering better decision-making and issue resolution.
  • Customization: Users can tailor Datadog to their specific needs. Custom dashboards and alerts ensure that monitoring is aligned with business priorities and critical metrics.
  • Cost-Efficiency: While pricing can be a consideration, Datadog is recognized for its cost-efficiency when compared to similar products. The platform's robust features justify the investment for many organizations.
  • Integration Capabilities: Datadog seamlessly integrates with a wide range of third-party applications and services, streamlining workflows and providing even more extensive insights.
  • Compliance Reporting: Datadog simplifies compliance reporting, aiding organizations in meeting regulatory requirements more effectively, which is crucial in industries like healthcare and finance.
  • Outstanding Performance: Users consistently report that Datadog outperforms similar products. It provides a reliable and high-performing solution for monitoring and analytics needs.
read more...
  • Automate Threat Detection & Response: Save time by automatically compiling data from several platforms like SaaS, IaaS, PaaS, exchange servers, applications and on-premise network devices in a centralized console. Accelerate threat resolution by automating incident response using workflow options.
  • Maximize ROI: Reduce upfront costs with low-cost enterprise-grade services. Minimize investment by leveraging service providers for implementation and quick deployment.
  • Ensure Privileged User Monitoring:  Eliminate the risk of privileged users going rogue by continuously monitoring user activities. Prevent insider attacks with regular reports on suspicious behavior.
  • Strengthen Compliance:: Maintain compliance with regulatory mandates like PCI, GLBA, DSS, HIPAA, FISMA, SOX and ISO 27001. Access audit-related report templates and get alerts to avoid violation risks and fines.
  • Prevent Security Event Threats:  Detect and prevent advanced threats like brute force attacks, privilege escalation and misuse, and data breaches with signature-based MITRE ATT&CK technique, ML-based behavior analytics, and integrated CASB and DLP capabilities.
  • Enhanced Threat Detection: Log360 provides robust threat detection capabilities that enable organizations to identify and respond to security threats in real-time. This benefit ensures proactive security measures and minimizes the risk of breaches.
  • Real-Time Monitoring: Users appreciate Log360's ability to offer real-time monitoring of their IT environments. This ensures that any suspicious activities or anomalies are immediately detected, allowing for swift action.
  • Incident Response Automation: Log360 streamlines incident response through automation. This benefit reduces the response time to security incidents, minimizing potential damage and data breaches.
  • Centralized Log Management: Log360 simplifies log management by centralizing log data from various sources. This centralization offers a comprehensive view of an organization's IT environment, facilitating easier analysis and troubleshooting.
  • Comprehensive Compliance Reporting: Users value Log360's capability to generate compliance reports. This feature aids in meeting regulatory requirements and streamlining compliance processes, ensuring data security and integrity.
read more...
  • Infrastructure Monitoring: Datadog offers in-depth infrastructure monitoring, allowing users to track the health and performance of servers, containers, and cloud environments in real-time. It provides visibility into CPU, memory, and disk usage, aiding in resource optimization.
  • Application Performance Tracking: Users can closely monitor the performance of applications with Datadog, identifying bottlenecks, errors, and latency issues. This feature helps improve user experiences and application efficiency.
  • Log Management: Datadog's log management capabilities enable users to centralize and analyze logs from various sources. This assists in troubleshooting and identifying security threats and compliance issues.
  • Real-Time Data: Datadog excels in providing real-time data and insights, ensuring that users have access to the most up-to-date information. Real-time monitoring is vital for proactive issue resolution and quick responses to anomalies.
  • Custom Dashboards: Datadog allows users to create custom dashboards tailored to their specific needs. These dashboards can display critical metrics, offering a personalized monitoring experience.
  • Alerting and Notification: Datadog's alerting system allows users to set up customized alerts based on predefined thresholds. When thresholds are breached, the platform can send notifications via various channels to ensure timely response to issues.
  • Collaboration Tools: Datadog promotes collaboration among teams through shared data and insights. Cross-functional teams, such as DevOps, IT, and development, can work together effectively to resolve issues and make informed decisions.
  • Scalability: Datadog is built to scale with businesses as they grow. It can accommodate increasing data volumes and monitoring needs, ensuring that performance remains optimal.
  • Integration Capabilities: Datadog seamlessly integrates with a wide range of third-party applications, tools, and services. This integration simplifies workflows, streamlines data collection, and enhances monitoring capabilities.
  • Compliance Reporting: Datadog assists organizations in meeting regulatory compliance requirements. It simplifies the process of generating compliance reports, which is particularly valuable in industries with strict regulatory mandates.
read more...
  • Incident Detection: Detect suspicious activities and malicious incidents with continuous log data monitoring, analysis and reporting. Get incident alerts with a real-time alert feature.
  • Security Analytics:  Spot network threats, intrusions and breaches by analyzing events from servers, network devices, Microsoft Office 365 platforms and exchange servers. Respond to anomalies with interactive dashboards and customized analytics reports.
  • Threat Intelligence: Stay on top of evolving threats with an integrated threat intelligence platform. Get updated information on the latest threats with a TAXII/STIX threat feed processor that retrieves global threat data and maintains a database of malicious IPs.
  • Incident Resolution: Automatically assign teams to security alerts and track the incident resolution progress. Automated workflows ensure the timely implementation of preventive measures against threats.
  • Cloud Monitoring: Continuously monitor and identify threats on cloud-based PaaS and IaaS platforms like Amazon web services, Microsoft Azure and SaaS solutions like Salesforce.
  • Data Security: Discover and prioritize personal and sensitive information throughout your Windows infrastructure with confidential data detection policies. Protect data from breach attempts with file integrity monitoring capabilities.
  • Forensic Analysis: Assess post-attack impact and identify attacking patterns to avoid future threats by analyzing event and log data. Automatically perform forensic analysis and mitigate the possibility of human error or oversight in drilling down data.
  • Event Correlation: Correlate information from various sources like endpoints, servers and intrusion prevention systems into a single console to get a comprehensive idea of the company’s security situation. Customize correlation rules and regulations with a custom rule builder and quickly detect and resolve security incidents.
  • User Entity and Behavior Analytics (UEBA): Identify anomalous activities in the network using analysis reports on even slight changes in user and entity behavioral patterns.
read more...

Product Ranking

#1

among all
SIEM Tools

#4

among all
SIEM Tools

Find out who the leaders are

Analyst Rating Summary

we're gathering data
85
we're gathering data
100
we're gathering data
100
we're gathering data
84
Show More Show More

Analyst Ratings for Functional Requirements Customize This Data Customize This Data

Datadog
Log360
+ Add Product + Add Product
Dashboards And Reporting Log Collection And Management Platform Capabilities Security Orchestration, Automation And Response (SOAR) Threat Detection, Investigation And Response (TDIR) User And Entity Behavior Analytics (UEBA) 100 100 84 100 80 100 0 25 50 75 100
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
100%
0%
0%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
100%
0%
0%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
83%
0%
17%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
100%
0%
0%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
80%
0%
20%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
100%
0%
0%

Analyst Ratings for Technical Requirements Customize This Data Customize This Data

we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
71%
0%
29%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
88%
0%
12%

User Sentiment Summary

Great User Sentiment 121 reviews
Excellent User Sentiment 62 reviews
84%
of users recommend this product

Datadog has a 'great' User Satisfaction Rating of 84% when considering 121 user reviews from 2 recognized software review sites.

94%
of users recommend this product

Log360 has a 'excellent' User Satisfaction Rating of 94% when considering 62 user reviews from 3 recognized software review sites.

0.46 (10)
n/a
n/a
4.4 (12)
4.56 (111)
4.6 (10)
n/a
4.8 (40)

Awards

we're gathering data

Log360 stands above the rest by achieving an ‘Excellent’ rating as a User Favorite.

User Favorite Award

Synopsis of User Ratings and Reviews

Real-time Monitoring: Datadog offers unparalleled real-time monitoring capabilities, enabling users to detect issues instantly.
Comprehensive Metrics: Users appreciate the vast array of metrics Datadog tracks, providing deep insights into system performance.
Intuitive Dashboards: Datadog's user-friendly dashboards make data visualization and analysis a breeze, saving time and improving decision-making.
Customizable Alerts: The ability to set up highly customizable alerts ensures that users are promptly notified of critical events.
Seamless Integrations: Datadog's extensive integration options facilitate smooth collaboration with various third-party tools and services.
AI-Powered Analytics: Datadog's machine learning capabilities help users uncover hidden patterns and anomalies in their data.
Scalability: Users commend Datadog's scalability, allowing them to adapt to evolving business needs without hassle.
Knowledge Sharing: Datadog's knowledge-sharing features enhance team collaboration and foster a culture of continuous improvement.
Show more
Effective Threat Detection: Log360 is highly praised for its robust threat detection capabilities, allowing users to proactively identify and respond to potential security threats in real-time.
Real-Time Monitoring: Users appreciate Log360's ability to provide real-time monitoring of their IT environments, enabling them to detect and respond to suspicious activities promptly.
Incident Response Automation: Log360 streamlines incident response through automation, reducing response times and minimizing the impact of security incidents.
Centralized Log Management: The product's centralized log management feature simplifies log data collection from various sources, offering a comprehensive view of the organization's IT environment for analysis and troubleshooting.
Comprehensive Compliance Reporting: Log360's ability to generate comprehensive compliance reports is highly valued, as it simplifies compliance processes and helps organizations meet regulatory requirements effectively.
Show more
Costly Pricing: Some users find Datadog's pricing on the higher side, making it less budget-friendly for smaller organizations.
Learning Curve: Users have reported that Datadog can be complex for new users, requiring a steeper learning curve.
Limited Customization: While Datadog offers extensive out-of-the-box functionality, some users wish for more flexibility in customizing features to suit their unique needs.
Resource Intensive: A few users have experienced performance issues, as Datadog can be resource-intensive, particularly in large-scale environments.
Alert Fatigue: Overly aggressive alerting settings can lead to alert fatigue for some users, making it challenging to differentiate critical issues from noise.
Limited Free Plan: Datadog's free plan has limitations that may not fully serve the needs of smaller businesses, requiring them to upgrade sooner than desired.
Integration Complexity: Integrating Datadog with certain platforms can be intricate, posing challenges for users seeking a seamless setup process.
Documentation Gaps: Some users have noted occasional gaps in Datadog's documentation, leading to frustration when seeking assistance.
Show more
Resource-Intensive: Some users find that Log360 can be resource-intensive, which can pose challenges, especially for smaller organizations with limited hardware and IT resources.
Complex for Small Businesses: Small businesses may struggle with the complexity of Log360, as the feature set and learning curve might be beyond their specific needs and budget constraints.
Steep Learning Curve: Implementing Log360 can present a significant learning curve, and users may require dedicated training and onboarding efforts to make the most of the product.
Integration Challenges: Some users report challenges when trying to integrate Log360 with specific third-party applications and systems, which can disrupt workflows and necessitate additional effort.
Pricing Considerations: Pricing may be a limitation for some organizations, particularly those with budget constraints. Users should carefully consider the investment required to implement Log360.
Show more

User reviews of Datadog reveal a mixed bag of opinions, highlighting both strengths and weaknesses. One standout feature praised by users is Datadog's real-time monitoring capabilities, allowing for immediate issue detection. The comprehensive metrics provided by the platform offer deep insights into system performance, while the user-friendly dashboards simplify data visualization. As one user put it, "Datadog's real-time monitoring is a game-changer, and their dashboards make data analysis a breeze." However, Datadog is not without its drawbacks. Some users express concerns about the cost, deeming it on the higher end, which might not be ideal for smaller organizations. Additionally, there is a learning curve associated with the platform, making it less user-friendly for beginners. One user commented, "Datadog is powerful but can be overwhelming for new users." When compared to similar products, Datadog's seamless integrations and AI-powered analytics stand out, facilitating efficient collaboration and uncovering hidden patterns. Nonetheless, it faces challenges related to resource intensity and alert fatigue. Some users believe it competes well with alternatives, while others find it lacks the flexibility and customization they desire. In the words of a user, "Datadog is strong but may not suit all use cases; it's a trade-off between power and complexity." Overall, Datadog's user reviews indicate a powerful monitoring tool with advanced features that cater to diverse needs. However, its pricing and complexity may deter some potential users.

Show more

User reviews of Log360 reveal a generally positive sentiment, highlighting its strengths in centralized log management, real-time threat detection, and ease of use. One user remarked, "Log360 has helped us centralize our logs from all our systems, giving us a complete picture of our security posture. This makes it much easier to identify and investigate potential threats." Another user appreciated the real-time threat detection capabilities, stating, "Log360 has helped us prevent several security incidents by detecting suspicious activity before it could become a major problem." However, some users also mention challenges related to the initial setup and learning curve. One user commented, "Setting up Log360 can be a bit complex for first-time users." Another user noted, "The interface can be a bit overwhelming at first, but there are plenty of resources available to help you get up to speed." Overall, users believe that Log360 offers a powerful and comprehensive SIEM solution at a competitive price. They appreciate its user-friendly interface, extensive features, and cloud-based deployment. One user compared Log360 to other SIEM solutions, saying, "We considered several SIEM solutions, but Log360 offered the best combination of features and price." Another user highlighted Log360's unique cloud-based approach, stating, "We were looking for a SIEM solution that was easy to deploy and maintain, and Log360's cloud-based platform was perfect for us." Based on the user reviews, Log360 is a compelling choice for businesses of all sizes looking for a powerful and user-friendly SIEM solution. Its strengths in centralized log management, real-time threat detection, and ease of use make it a valuable tool for enhancing security posture and mitigating potential risks.

Show more

Screenshots

we're gathering data

Top Alternatives in SIEM Tools


ArcSight ESM

Converged SIEM

Elastic Security

Exabeam

FortiSIEM

Gurucul

IBM QRadar

InsightIDR

Log360

LogRhythm

Microsoft Sentinel

Securonix

Splunk Enterprise Security

Sumo Logic

Trellix Enterprise Security Manager

USM Anywhere

Related Categories

WE DISTILL IT INTO REAL REQUIREMENTS, COMPARISON REPORTS, PRICE GUIDES and more...

Compare products
Comparison Report
Just drag this link to the bookmark bar.
?
Table settings