Consulting Services
Products

EventLog Analyzer Premium Edition

ManageEngine EventLog analyzer is licensed based on the number of log sources that are being added for monitoring. Note: A log source could be a server (eg: Oracle server, MS SQL server) or a device (eg: router,switch) or an application (eg: active directory, IIS, Apache) If you want to monitor an application and the server in which the application is installed, then you will be licensed for 2 log sources.
Manufacturer: Manage Engine

EventLog Analyzer is an IT Compliance & Event Log Management Software for SIEM

Your organizations IT infrastructure generate huge amount of logs every day and these machine generated logs have vital information that can provide powerful insights and network security intelligence into user behaviors, network anomalies, system downtime, policy violations, internal threats, regulatory compliance, etc. However, the task of analyzing these event logs and syslogs without automated log analyzer tools can be both time-consuming and painful if done manually.

 

EventLog Analyzer provides the most cost-effective Security Information and Event Management (SIEM) software on the market. Using this Log Analyzer software, organizations can automate the entire process of managing terabytes of machine generated logs by collecting, analyzing, correlating, searching, reporting, and archiving from one central location. This event log analyzer software helps to monitor file integrity, conduct log forensics analysis, monitor privileged users and comply to different compliance regulatory bodies by intelligently analyzing your logs and instantly generating a variety of reports like user activity reports, historical trend reports, and more.

 

Unlock the Real Value of your Machine Generated Logs

 

Real-Time Event Correlation

  • Over 70 out-of-the-box event correlation rules for proactive threat management
  • Pinpoints breach attempts, insider threats, policy violations, and more without any manual intervention
  • Flexible drag-n-drop correlation rule builder allows users to define attack patterns thus help in proactively reacting to security threats

 

Compliance Reports

  • Generate pre-defined/canned compliance reports for Event logs & Syslogs, to meet HIPAA, GLBA, PCI DSS, SOX, FISMA and more
  • Provides value added new feature to create custom report for new compliance to help comply with growing new regulatory acts demanding compliance in future

 

Universal Log Collection

  • Collects logs from heterogeneous sources (Windows systems, Unix/Linux systems, Applications, Routers, Firewalls, etc.) at a centralized location
  • Decipher any log data regardless of the source and log format
  • Agentless log collection (optional agents available)

 

File Integrity Monitoring

  • Centrally track all changes and get real time alerts when files and folders are created, accessed, viewed, deleted, modified, renamed, etc.
  • Get a complete audit trail of all the changes that happen on files and folders. Audit trail answers the 'what, when, where and how' of all changes in real-time!

 

Privileged User Monitoring

  • Collects and analyzes all events on privileged user activities
  • Get precise information of user access such as which user performed the action, what was the result of the action, on which server it happened and track down the user workstation from where the action was triggered

 

Log Search

  • Search for anything, not just a handful of pre-indexed fields, and quickly detect network anomalies, user activities, system/applications errors, etc.
  • Conduct a search using Wild-cards, Phrases and Boolean operators
  • Users can also conduct Grouped searches and Range searches

 

Real-time Alerting

  • Get alerted in real-time via SMS and email upon the occurrence of network anomaly. You can even run a program or script to remediate the alert condition
  • 500+ predefined alert criteria across Windows, Unix/Linux, Application and Network device infrastructure eliminates the need for setting up alert profile for routine tasks thus increasing the operational efficiency

 

Log Forensics

  • Drill down to raw logs events and do a root cause analysis within minutes, and drastically reduce the time-to-remediate
  • Generate network forensic reports like user activity reports, system audit reports, regulatory compliance reports, etc

 

Log Archive

  • Automatically archives all machine generated logs, system logs, device logs & application logs to a centralized repository
  • Encrypts the event log archive files to ensure the log data is secured for future forensic analysis, compliance and internal audits
Picture of ManageEngine EventLog analyzer Premium Edition - 10 Log Sources Pack
ManageEngine EventLog analyzer Premium Edition - 10 Log Sources Pack
$495.00
Picture of ManageEngine EventLog analyzer Premium Edition - 20 Log Sources Pack
ManageEngine EventLog analyzer Premium Edition - 20 Log Sources Pack
$795.00
Picture of ManageEngine EventLog analyzer Premium Edition - 50 Log Sources Pack
ManageEngine EventLog analyzer Premium Edition - 50 Log Sources Pack
$1,495.00
Picture of ManageEngine EventLog analyzer Premium Edition - 100 Log Sources Pack
ManageEngine EventLog analyzer Premium Edition - 100 Log Sources Pack
$2,795.00
Picture of ManageEngine EventLog analyzer Premium Edition - 250 Log Sources Pack
ManageEngine EventLog analyzer Premium Edition - 250 Log Sources Pack
$4,995.00
Picture of ManageEngine EventLog analyzer Premium Edition - 500 Log Sources Pack
ManageEngine EventLog analyzer Premium Edition - 500 Log Sources Pack
$7,995.00
Picture of ManageEngine EventLog analyzer Premium Edition - 1000 Log Sources Pack
ManageEngine EventLog analyzer Premium Edition - 1000 Log Sources Pack
$12,995.00
Picture of ManageEngine EventLog analyzer Premium Edition - Workstations (Pack of 100)
ManageEngine EventLog analyzer Premium Edition - Workstations (Pack of 100)
$195.00
Powered by nopCommerce Copyright © 2018 Legasystems. All rights reserved.
Facebook Twitter Linkedin Youtube Wordpress Blogspot