App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

LogPoint vs FortiSIEM Comparison

Add to Compare

Compare similar apps

Splunk Enterprise logo

Splunk Enterprise

4.6

Graylog logo

Graylog

4.6

IBM Security QRadar logo

IBM Security QRadar

4.5

Logsign Unified SO Platform logo

Logsign Unified SO Platform

4.9

AlienVault OSSIM logo

AlienVault OSSIM

4.0

Exabeam logo

Exabeam

5.0

Good recommendations?

Overview

LogPoint's SIEM platform helps businesses secure data from threats & respond to cyberattacks in compliance with regulatory norms.

FortiSIEM is a security Information and event management (SIEM) platform with user and entity behavior analytics (UEBA),...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

Pricing

Starting from

79

Per month

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

Starting from

ic-pricetag

No pricing info

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

User reviews

4.9

11

5

4

3

2

1

10

1

0

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

4.5

10

5

4

3

2

1

5

5

0

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

Pros

Not enoughreviews yet

Pros

Useful and powerful features. Easy to monitor and access logs.
It is good for the correlation of events, and necessary for a soc, to be able to respond to a securi.
First and foremost, i specifically like its robustness and flexibility and can accommodate most network infrastructure devices.

Cons

Not enoughreviews yet

Cons

One of the few points that I don't like is the amount of time in the implementation since having to configure all the computers to send all the logs to Siem requires many hours of work.
Some knowledge is needed to implement, it may be that you need help from your provider, this would be the only thing that could say negative.
  • Vendor responds to reviews
  • Last review8 months ago
  • Vendor responds to reviews
  • Last review2 years ago

Key features

  • Total features51
  • AI/Machine Learning
  • API
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Data Mapping
  • Data Security
  • Data Visualization
  • Diagnostic Tools
  • Endpoint Management
  • Endpoint Protection
  • Event Logs
  • File Integrity Monitoring
  • Incident Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Log Rotation
  • Monitoring
  • Network Monitoring
  • Policy Management
  • Process/Workflow Automation
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Management
  • Search/Filter
  • Security Auditing
  • Sensitive Data Identification
  • Server Logs
  • Server Monitoring
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Tokenization
  • User Management
  • Vulnerability Scanning
  • Whitelisting/Blacklisting
  • Total features20
  • AI/Machine Learning
  • API
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Data Mapping
  • Data Security
  • Data Visualization
  • Diagnostic Tools
  • Endpoint Management
  • Endpoint Protection
  • Event Logs
  • File Integrity Monitoring
  • Incident Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Log Rotation
  • Monitoring
  • Network Monitoring
  • Policy Management
  • Process/Workflow Automation
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Management
  • Search/Filter
  • Security Auditing
  • Sensitive Data Identification
  • Server Logs
  • Server Monitoring
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Tokenization
  • User Management
  • Vulnerability Scanning
  • Whitelisting/Blacklisting

Integrations

  • Total integrations2
  • Azure Active Directory
  • Blumira
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • OneLogin
  • PagerDuty
  • ServiceNow
  • Slack
  • Splunk Enterprise
  • WordPress
  • Zendesk Suite
  • Total integrations4
  • Azure Active Directory
  • Blumira
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • OneLogin
  • PagerDuty
  • ServiceNow
  • Slack
  • Splunk Enterprise
  • WordPress
  • Zendesk Suite