Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Datadog
Score 8.7 out of 10
N/A
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
$18
per month per host
IBM Security QRadar SIEM
Score 8.8 out of 10
N/A
IBM Security QRadar is security information and event management (SIEM) Software.N/A
Logstash
Score 9.0 out of 10
N/A
N/AN/A
Pricing
DatadogIBM Security QRadar SIEMLogstash
Editions & Modules
Log Management
$1.27
per month (billed annually) per host
Infrastructure
$15.00
per month (billed annually) per host
Standard
$18
per month per host
Enterprise
$27
per month per host
DevSecOps Pro
$27
per month per host
APM
$31.00
per month (billed annually) per host
DevSecOps Enterprise
$41
per month per host
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
DatadogIBM Security QRadar SIEMLogstash
Free Trial
YesYesNo
Free/Freemium Version
YesNoNo
Premium Consulting/Integration Services
NoNoNo
Entry-level Setup FeeOptionalNo setup feeNo setup fee
Additional DetailsDiscount available for annual pricing. Multi-Year/Volume discounts available (500+ hosts/mo).
More Pricing Information
Community Pulse
DatadogIBM Security QRadar SIEMLogstash
Features
DatadogIBM Security QRadar SIEMLogstash
Security Information and Event Management (SIEM)
Comparison of Security Information and Event Management (SIEM) features of Product A and Product B
Datadog
-
Ratings
IBM Security QRadar SIEM
8.5
69 Ratings
8% above category average
Logstash
-
Ratings
Centralized event and log data collection00 Ratings9.927 Ratings00 Ratings
Correlation00 Ratings8.669 Ratings00 Ratings
Event and log normalization/management00 Ratings9.527 Ratings00 Ratings
Deployment flexibility00 Ratings7.827 Ratings00 Ratings
Integration with Identity and Access Management Tools00 Ratings8.965 Ratings00 Ratings
Custom dashboards and workspaces00 Ratings7.469 Ratings00 Ratings
Host and network-based intrusion detection00 Ratings9.725 Ratings00 Ratings
Data integration/API management00 Ratings9.07 Ratings00 Ratings
Behavioral analytics and baselining00 Ratings7.648 Ratings00 Ratings
Rules-based and algorithmic detection thresholds00 Ratings8.049 Ratings00 Ratings
Response orchestration and automation00 Ratings7.75 Ratings00 Ratings
Reporting and compliance management00 Ratings8.047 Ratings00 Ratings
Incident indexing/searching00 Ratings8.97 Ratings00 Ratings
Best Alternatives
DatadogIBM Security QRadar SIEMLogstash
Small Businesses
InfluxDB
InfluxDB
Score 8.8 out of 10
LevelBlue USM Anywhere
LevelBlue USM Anywhere
Score 7.7 out of 10
SolarWinds Papertrail
SolarWinds Papertrail
Score 8.9 out of 10
Medium-sized Companies
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Enterprises
NetBrain Technologies
NetBrain Technologies
Score 8.9 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
All AlternativesView all alternativesView all alternativesView all alternatives
User Ratings
DatadogIBM Security QRadar SIEMLogstash
Likelihood to Recommend
9.4
(55 ratings)
8.4
(89 ratings)
9.0
(4 ratings)
Likelihood to Renew
-
(0 ratings)
8.6
(5 ratings)
-
(0 ratings)
Usability
9.2
(34 ratings)
8.0
(2 ratings)
9.0
(1 ratings)
Availability
-
(0 ratings)
9.0
(1 ratings)
-
(0 ratings)
Performance
-
(0 ratings)
9.0
(1 ratings)
-
(0 ratings)
Support Rating
8.9
(6 ratings)
8.1
(62 ratings)
-
(0 ratings)
In-Person Training
-
(0 ratings)
9.0
(1 ratings)
-
(0 ratings)
Online Training
-
(0 ratings)
9.0
(1 ratings)
-
(0 ratings)
Implementation Rating
-
(0 ratings)
8.0
(1 ratings)
-
(0 ratings)
Configurability
-
(0 ratings)
8.0
(1 ratings)
-
(0 ratings)
Contract Terms and Pricing Model
-
(0 ratings)
9.0
(1 ratings)
-
(0 ratings)
Ease of integration
-
(0 ratings)
8.1
(58 ratings)
-
(0 ratings)
Product Scalability
-
(0 ratings)
8.0
(1 ratings)
-
(0 ratings)
Professional Services
-
(0 ratings)
10.0
(1 ratings)
-
(0 ratings)
Vendor post-sale
-
(0 ratings)
9.0
(1 ratings)
-
(0 ratings)
Vendor pre-sale
-
(0 ratings)
9.0
(1 ratings)
-
(0 ratings)
User Testimonials
DatadogIBM Security QRadar SIEMLogstash
Likelihood to Recommend
Datadog
Datadog may be better suited for teams that have a more out-of-the-box infrastructure, on the primary platforms Datadog supports. You may also have better results if you have a bigger team dedicated to devops and/or a bigger budget. We found that trying to adapt it to our use case (small team, .NET on AWS Fargate) wasn't feasible. We continually ran into roadblocks that required us to dig through documentation (and at times, having to figure out some documentation was wrong), go back and forth with support, and in my opinion, waste money on excessive and unintended usages due to opaque pricing models and inaccurate usage reports, as well as broken/non-functional rate sampling controls.
Read full review
IBM
I would only recommend IBM Security QRadar SIEM in a few situations. For one, it's very easy to setup and use if all your log sources are generic from known vendors. It's also significantly cheaper than Splunk, which is nice if you're trying to save money or be more efficient. I would not recommend IBM Security QRadar SIEM for environments with a lot of custom logs and complicated detection requirements.
Read full review
Elastic
Perfect for projects where Elasticsearch makes sense: if you decide to employ ES in a project, then you will almost inevitably use LogStash, and you should anyways. Such projects would include: 1. Data Science (reading, recording or measure web-based Analytics, Metrics) 2. Web Scraping (which was one of our earlier projects involving LogStash) 3. Syslog-ng Management: While I did point out that it can be a bit of an electric boo-ga-loo in finding an errant configuration item, it is still worth it to implement Syslog-ng management via LogStash: being able to fine-tune your log messages and then pipe them to other sources, depending on the data being read in, is incredibly powerful, and I would say is exemplar of what modern Computer Science looks like: Less Specialization in mathematics, and more specialization in storing and recording data (i.e. Less Engineering, and more Design).
Read full review
Pros
Datadog
  • The thing which Datadog does really well, one of them are its broad range of services integrations and features which makes it one step observability solution for all. We can monitor all types of our application, infrastructure, hosts, databases etc with Datadog.
  • Its custom dashboard feature which helps us to visualize the data in a better way . It supports different types of charts through those charts we can create our dashboard more attractive.
  • Its AI powered alerting capability though that we can easily identify the root cause and also it has a low noise alerting capability which means it correlated the similar type of issues.
Read full review
IBM
  • Enables identification and prioritization of vulnerabilities in IT infrastructure for corrective action.
  • Facilitates security incident investigation and forensic analysis.
  • Provides a real-time view of security events, enabling immediate incident response.
  • Can integrate with external threat intelligence sources to enrich data and improve threat detection.
  • Enables the generation of detailed and customized reports.
Read full review
Elastic
  • Logstash design is definitely perfect for the use case of ELK. Logstash has "drivers" using which it can inject from virtually any source. This takes the headache from source to implement those "drivers" to store data to ES.
  • Logstash is fast, very fast. As per my observance, you don't need more than 1 or 2 servers for even big size projects.
  • Data in different shape, size, and formats? No worries, Logstash can handle it. It lets you write simple rules to programmatically take decisions real-time on data.
  • You can change your data on the fly! This is the CORE power of Logstash. The concept is similar to Kafka streams, the difference being the source and destination are application and ES respectively.
Read full review
Cons
Datadog
  • Alert windows cause lag in notifications (e.g. if the alert window is X errors in 1 hour, we won't get alerted until the end of the 1 hour range)
  • I would appreciate more supportive examples for how to filter and view metrics in the explorer
  • I would like a more clear interface for metrics that are missing in a time frame, rather than only showing tags/etc. for metrics that were collected within the currently viewed time frame
Read full review
IBM
  • Need to spend more time configuring the system to properly interpret and normalize different type of data collected from multiple resources.
  • While Rule creation QRadar uses that rules to detect security threats and generate alerts, but to creating and managing rules is bit complex & tedious work to complete.
  • IBM Security QRadar SIEM is excellent in handling large & complex systems that requires in-depth knowledge and extensive training to configure and maintain the system which includes upgrading, optimization of performance & issue troubleshooting.
Read full review
Elastic
  • It is heavy i.e., intensive as of now. Need to reduce overhead to save CPU/RAM consumption
  • Need to be more Kubernetes-friendly. Should support auto-scaling and K8s observability
  • Initial configuration is still complex. A seamless config procedure is still required
Read full review
Likelihood to Renew
Datadog
Definitely will not revisit after our issues and, in my opinion, poor support.
Read full review
IBM
QRadar is an established and stable product, we have been using it for many years and want to continue to focus on it. Anyone who has used the product and knows it knows how reliable it is and how it facilitates continuous monitoring of threats from outside and inside. it is an exceptional product that is very useful for us.
Read full review
Elastic
No answers on this topic
Usability
Datadog
There are so many features that it can be hard to figure out where you need to go for your own use case. For example, RUM monitoring us buried in a "Digital Experience" sidebar setting when this is one of our key use cases that I sometimes struggle to find in the application. It appears that ECS + Fargate monitoring was recently released which is great because we had to build a lambda reporting solution for ephemeral task monitoring. But this new feature was never on my radar until I starting clicking around the application.
Read full review
IBM
As a grade I give 8 as QRadar is not easy to learn. It requires some time to master it. It also needs a team of people actively working on the product. Once you learn to use it the software works very well and it is easy to correlate and understand detected threats. It only takes time to learn how to use it well and configure it properly.
Read full review
Elastic
As I said earlier, for a production-grade OpenStack Telco cloud, Logstash brings high value in flexibility, compliance, and troubleshooting efficiency. However, this brings a higher infra & ops cost on resources, but that is not a problem in big datacenters because there is no resource crunch in terms of servers or CPU/RAM
Read full review
Support Rating
Datadog
The support team usually gets it right. We did have a rather complicate issue setting up monitoring on a domain controller. However, they are usually responsive and helpful over chat. The downside would be I don’t think they have any phone support. If that is important to you this might not be a good fit.
Read full review
IBM
Customer support is Good of IBM, While Using IBM QRadar its deployment is to slow and suddenly stop working and crashed we have contacted IBM Support and Rised a Ticket within a few minute we get call back from customer support and Query Resolved by them Fast And Rapid Support of Ibm
Read full review
Elastic
No answers on this topic
In-Person Training
Datadog
No answers on this topic
IBM
The training was very useful and the people who taught us were very knowledgeable. Although the software may initially seem difficult to learn they made things much easier for us.
Read full review
Elastic
No answers on this topic
Online Training
Datadog
No answers on this topic
IBM
The training was very useful and the people who taught us were very knowledgeable. Although the software may initially seem difficult to learn they made things much easier for us.
Read full review
Elastic
No answers on this topic
Implementation Rating
Datadog
Documentation was difficult to work through, rollout was catastrophic (completely outage)
Read full review
IBM
Initial patience is required to learn how to use the product, and it takes a dedicated team to use it. One person is not enough, and it's not enough to just set it up and check it once in a while. It has to be used daily and kept under control to be used effectively
Read full review
Elastic
No answers on this topic
Alternatives Considered
Datadog
Our logs are very important, and Datadog manages them exceptionally well. We frequently use Datadog services for our investigations. Use case: Monitor your apps, infrastructure, APIs, and user experience.


Key features:


Logs, metrics, and APM (Application Performance Monitoring)


Real-time alerting and dashboards


Supports Kubernetes, AWS, GCP, and other integrations


RUM (Real User Monitoring) and Synthetics





✅ Best for backend, server, and distributed systems monitoring.
Read full review
IBM
IBM Qradar takes the best from its competitors. Reliable and stable but sometimes very expensive, the SIEM from IBM offers a wide range of scenarios in which the customers can suite and size their own infrastructures. IBM Qradar doesn't really needs to stack up againt its competitors because it already sets an example in the SIEM world.
Read full review
Elastic
Logstash can be compared to other ETL frameworks or tools, but it is also complementary to several, for example, Kafka. I would not only suggest using Logstash when the rest of the ELK stack is available, but also for a self-hosted event collection pipeline for various searching systems such as Solr or Graylog, or even monitoring solutions built on top of Graphite or OpenTSDB.
Read full review
Return on Investment
Datadog
  • Saved us (time & money) from developing our own monitoring utilities that would pale in comparison
  • Alerts allow us to remedy issues before our customers even know about them
  • Tracking resource usage over time allows us to better plan for future needs, before it becomes a pain-point.
Read full review
IBM
  • Offense investigation was really helped in tackling the incidents. It was accurate and brief
  • The automation with IBM resilient (SOAR) was a milestone in elimination of user mistakes
  • The X-Force threat intelligence supported us in getting the work done without any 3rd party enterprise OSINT database
Read full review
Elastic
  • Positive: LogStash is OpenSource. While this should not be directly construed as Free, it's a great start towards Free. OpenSource means that while it's free to download, there are no regular patch schedules, no support from a company, no engineer you can get on the phone / email to solve a problem. You are your own Engineer. You are your own Phone Call. You are your own ticketing system.
  • Negative: Since Logstash's features are so extensive, you will often find yourself saying "I can just solve this problem better going further down / up the Stack!". This is not a BAD quality, necessarily and it really only depends on what Your Project's Aim is.
  • Positive: LogStash is a dream to configure and run. A few hours of work, and you are on your way to collecting and shipping logs to their required addresses!
Read full review
ScreenShots

Datadog Screenshots

Screenshot of the out-of-the-box and customizable monitoring dashboards.Screenshot of Datadog's collaboration features, where users can discuss issues in-context with production data, annotate changes and notify their teams, see who responded to that alert before, and discover what was done to fix it.Screenshot of where Datadog unifies traces, metrics, and logs—the three pillars of observability.Screenshot of some of Datadog's 400+ built-in integrations.Screenshot of Datadog's Service Map, which decomposes an application into all its component services and draws the observed dependencies between these services in real timeScreenshot of centralized log data, pulled from any source.

IBM Security QRadar SIEM Screenshots

Screenshot of QRadar SIEM Cloud native- Threat intelligence preview