www.manageengine.com Open in urlscan Pro
185.20.209.211  Public Scan

URL: https://www.manageengine.com/products/eventlog/?utm_source=mailer&utm_medium=tool&utm_campaign=promo&utm_term=ld_allprod_ad360
Submission Tags: falconsandbox
Submission: On September 10 via api from US — Scanned from NL

Form analysis 1 forms found in the DOM

Name: form-hockey_v1 https://www.manageengine.com/search-results.html

<form id="cse-search-box" action="https://www.manageengine.com/search-results.html" name="form-hockey_v1"> <input id="hockey_v1-query" type="text" placeholder="Search..." value="" class="newsearchbox fl" name="query"></form>

Text Content

 
 
 
Support
 
Support Get Quote
 * Products
   
   
    * IDENTITY AND ACCESS MANAGEMENT
   
   
    * UNIFIED SERVICE MANAGEMENT
   
   
    * UNIFIED ENDPOINT MANAGEMENT AND SECURITY
   
   
    * IT OPERATIONS MANAGEMENT
   
   
    * SECURITY INFORMATION AND EVENT MANAGEMENT
   
   
    * ADVANCED IT ANALYTICS
   
   
    * LOW-CODE APP DEVELOPMENT
   
   
    * CLOUD SOLUTIONS FOR ENTERPRISE IT
   
   
    * IT MANAGEMENT FOR MSPS
   
   
   ACTIVE DIRECTORY
   MANAGEMENT MANAGE, TRACK, AND SECURE ACTIVE DIRECTORY.
   
   
   IDENTITY GOVERNANCE
   AND ADMINISTRATIONORCHESTRATE USER IDENTITY MANAGEMENT AND ACCESS CONTROLS
   FOR ZERO TRUST.
   
   
   PRIVILEGED ACCESS
   MANAGEMENTCONTROL AND SECURE PRIVILEGED ACCESS TO CRITICAL ENTERPRISE
   SYSTEMS.
   
    * ADManager Plus
      
      Active Directory, Microsoft 365, and Exchange management and reporting
   
    * ADAudit Plus
      
      Real-time Active Directory, file, and Windows server change auditing
   
    * ADSelfService Plus
      
      Identity security with adaptive MFA, SSPR, and SSO
   
    * Exchange Reporter Plus
      
      Reporting, auditing, and monitoring for hybrid Exchange and Skype
   
    * RecoveryManager Plus
      
      Active Directory, Microsoft 365, and Exchange backup and recovery
   
    * AD360
      
      Workforce identity and access management for hybrid ecosystems
   
    * Identity360
      
      A cloud-native identity platform for workforce IAM
   
    * M365 Manager Plus
      
      Microsoft 365 management, reporting, and auditing
   
    * PAM360
      
      Complete privileged access security for enterprises
   
    * Password Manager Pro
      
      Privileged password management
   
    * Access Manager Plus
      
      Secure remote access and privileged session management
   
    * Key Manager Plus
      
      SSH key and SSL/TLS certificate management
   
   Related free tools Hybrid AD management toolsActive Directory Academy
   
   
   ENTERPRISE AND IT SERVICE
   MANAGEMENTDELIVER A CONSISTENT EMPLOYEE EXPERIENCE ACROSS BUSINESS FUNCTIONS.
   
   
   CUSTOMER SERVICE
   MANAGEMENTBUILD A ONE-STOP PORTAL FOR CUSTOMERS WITH EFFICIENT ACCOUNT
   MANAGEMENT.
   
   
   IT ASSET
   MANAGEMENTCENTRALIZE AND AUTOMATE THE COMPLETE IT ASSET LIFE CYCLE.
   
    * ServiceDesk Plus
      
      Full-stack service management for enterprises
   
    * SupportCenter Plus
      
      Customer support with built-in billing for businesses
   
    * AssetExplorer
      
      IT asset management with an integrated CMDB
   
   
   SIEM SPOT, INVESTIGATE, AND NEUTRALIZE SECURITY THREATS.
   
   
   LOG AND COMPLIANCE MANAGEMENTGAIN DEEPER VISIBILITY INTO SECURITY EVENTS AND
   ENSURE COMPLIANCE.
   
   
   SECURITY AUDITINGAUDIT ACTIVE DIRECTORY, CLOUD PLATFORMS AND FILES TO ENHANCE
   YOUR SECURITY POSTURE.
   
    * Log360
      
      Unified SIEM solution with integrated DLP and CASB capabilities
   
    * EventLog Analyzer
      
      Comprehensive log and IT compliance management
   
    * Firewall Analyzer
      
      Firewall rule, configuration, and log management
   
    * ADAudit Plus
      
      Real-time Active Directory, file, and Windows server change auditing
   
    * SharePoint Manager Plus
      
      SharePoint reporting and auditing
   
    * M365 Security Plus
      
      Microsoft 365 security
   
    * Cloud Security Plus
      
      Cloud security monitoring and analytics
   
    * DataSecurity Plus
      
      File auditing, data leak prevention, and data risk assessment
   
    * FileAnalysis
      
      File security and storage analysis
   
   SIEM Hubspot
   
   
   ENDPOINT MANAGEMENT AND PROTECTION PLATFORM (UEM AND EPP)SECURE AND MANAGE
   ENDPOINTS TO PROTECT YOUR IT ASSETS EFFECTIVELY.
   
   
   ENDPOINT MANAGEMENTACHIEVE INTELLIGENT IT DEVICE MANAGEMENT WITH ZERO USER
   INTERVENTION.
   
   
   ENDPOINT SECURITYDEFEND AGAINST THREAT ACTORS WITH PROACTIVE AND REACTIVE
   MEASURES.
   
    * Endpoint Central
      
      Integrated endpoint management and protection platform
   
    * Patch Manager Plus
      
      Automated patching across multiple OSs and over 850+ third-party apps
   
    * Patch Connect Plus
      
      Simplified third-party patch deployment via ConfigMgr and Intune
   
    * Mobile Device Manager Plus
      
      Seamless mobile device management from onboarding to retirement
   
    * Remote Access Plus
      
      Remote troubleshooting with integrated chat, voice, and video
   
    * OS Deployer
      
      Automated OS image creation and seamless role-based deployment
   
    * Vulnerability Manager Plus
      
      Prioritization-focused enterprise vulnerability management
   
    * Application Control Plus
      
      App control and endpoint privilege management software
   
    * Device Control Plus
      
      Data theft prevention with strict peripheral device control
   
    * Browser Security Plus
      
      Browser security with isolation, lockdown, and activity tracking
   
    * Endpoint DLP Plus
      
      Sensitive data protection and compliance for endpoint devices
   
   Free Windows admin tools Free system tools
   
   
   NETWORK AND SERVER
   PERFORMANCE MONITORINGMANAGE AND OPTIMIZE NETWORK, SERVER, AND APPLICATION
   PERFORMANCE.
   
   
   APPLICATION PERFORMANCE
   MONITORINGMONITOR, MANAGE, AND TROUBLESHOOT APPLICATION PERFORMANCE.
   
   
   IT INCIDENT
   MANAGEMENT GET INSTANT ALERTS FOR CRITICAL INCIDENTS AND PROVIDE REAL-TIME
   STATUS UPDATES.
   
    * OpManager Plus
      
      Unified network, server, and application management
   
    * OpManager
      
      Network performance monitoring
   
    * NetFlow Analyzer
      
      Bandwidth monitoring and traffic analysis
   
    * Network Configuration Manager
      
      Network change and configuration management
   
    * Firewall Analyzer
      
      Firewall rule, configuration, and log management
   
    * OpUtils
      
      IP address and switch port management
   
    * Applications Manager
      
      Server and application performance monitoring
   
    * Site24x7
      
      Full-stack monitoring for IT admins, DevOps, and SREs
   
   
   DNS AND DHCP MANAGEMENTOPTIMIZED IP ADDRESS CONFIGURATION AND DOMAIN
   MANAGEMENT.
   
    * CloudDNS
      
      An all-in-one DNS management service to keep your business online
   
    * DDI Central
      
      Unified DNS, DHCP, and IP address manager
   
    * AlarmsOne
      
      Centralized IT alert management
   
    * Site24x7 StatusIQ
      
      Status pages for real-time status and incident communication
   
   Related free tools
   
   
   IT ANALYTICSCONNECT TO YOUR IT APPLICATIONS AND VISUALIZE ALL FACETS OF YOUR
   IT.
   
    * Analytics Plus
      
      AI-powered unified analytics platform to correlate all IT data
   
    * CloudSpend
      
      Cloud cost management for modern software teams
   
    * SaaS Manager Plus
      
      SaaS management platform to maximize ROI
   
   
   CLOUD-NATIVE SOLUTIONS FOR IT MANAGEMENTMONITOR, MANAGE, AUDIT, AND SECURE
   YOUR MULTI-CLOUD
   AND HYBRID INFRASTRUCTURE.
   
   
   BUSINESS APPLICATIONS FOR ITBOOST PRODUCTIVITY AND IMPROVE TEAM
   COLLABORATION.
   
    * Identity360
      
      A cloud-native identity platform for workforce IAM
   
    * ServiceDesk Plus
      
      Full-stack service management for enterprises
   
    * Endpoint Central
      
      Unified endpoint management and security
   
    * Mobile Device Manager Plus
      
      Comprehensive mobile device management
   
    * Remote Access Plus
      
      Enterprise remote access
   
    * Patch Manager Plus
      
      Automated multi-OS patch management
   
    * Site24x7
      
      Full-stack monitoring for IT admins, DevOps, and SREs
   
    * Site24x7 StatusIQ
      
      Status pages for real-time status and incident communication
   
    * CloudSpend
      
      Cloud cost management for modern software teams
   
    * SaaS Manager Plus
      
      SaaS management platform to maximize ROI
   
    * AlarmsOne
      
      Centralized IT alert management
   
    * Log360 Cloud
      
      Secure your IT infrastructure and prove compliance from the cloud
   
    * Analytics Plus
      
      AI-powered unified analytics platform to correlate all IT data
   
    * CloudDNS
      
      An all-in-one DNS management service to keep your business online
   
    * Zoho Creator
      
      Low-code application development platform
   
    * Zoho Assist
      
      Remote support software
   
    * Zoho Projects
      
      Collaborative project management
   
    * Zoho Sprints
      
      Agile project management
   
    * Zoho Workplace
      
      All-in-one collaboration tool for unified communication
   
    * Zoho Mail
      
      Secure email hosting solution for businesses
   
    * Zoho Meeting
      
      All-in-one video conferencing solution for remote business meetings
   
    * Zoho Lens
      
      All-in-one AR remote assistance software solution for remote
      collaboration.
   
   Our DatacentersAWS marketplace Azure marketplace
   
   
   CUSTOM SOLUTION BUILDERBUILD TAILOR-MADE APPS TO AUTOMATE OPERATIONS AT YOUR
   ORGANIZATION.
   
    * AppCreator
      
      Advanced low-code platform for building powerful applications
   
   
   SOLUTIONS FOR MSPSGROW YOUR MSP BUSINESS WITH SCALABLE AND SECURE IT
   MANAGEMENT SOLUTIONS.
   
    * RMM Central
      
      Unified network monitoring and endpoint management for MSPs
   
    * ADManager Plus MSP
      
      Unified Active Directory management and reporting solution for MSPs
   
    * Log360 MSSP
      
      Unified SIEM solution for MSSPs
   
    * EventLog Analyzer MSSP
      
      Log management and advanced threat intelligence for MSSPs
   
    * PAM360
      
      Complete privileged access security for enterprises
   
    * Password Manager Pro
      
      Privileged password management
   
    * ServiceDesk Plus MSP
      
      Full-stack service management for enterprises
   
    * Endpoint Central MSP
      
      Unified endpoint management and security
   
    * Mobile Device Manager Plus MSP
      
      Comprehensive mobile device management
   
    * OpManager MSP
      
      Network performance monitoring
   
    * Site24x7
      
      Remote monitoring for MSPs and CSPs
   
   View all products
 * Store
 * Partners
 * Affiliate
 * Support
    * Support enquiries
    * Evaluators
    * Training and certification
    * Service packs
    * Downloads and signups
    * Product updates
    * Security Response Center
    * Follow us:
             
   
    * System requirements
    * Product documentation
    * Knowledge base
    * White papers
    * Forums
    * Blogs
   
    * Toll Free
    * US Sales: +1 888 720 9500
    * US Support: +1 844 649 7766
    * US Sales: +1 833-420-0996
    * CA Sales: +1 833-416-0441
    * Aus: 1800 631 268
    * UK: 0800 028 6590
    * IN: 1800 572 6673
    * Tel
    * Intl: +1 925 924 9500
    * CN: +86 400 660 8680
    * Tel: +1 408 352 9254
    * Direct Inward Dialing
    * Tel: +1 408 352 9254

 *  
   Login | Register
 *  
   Desktop Management | On-premises | Active Directory Management and Reporting
   | Remote Access Software | Asset Management | Customer Support Software |
   Help Desk Software | Remote Support Software | OS Deployment | Active
   Directory Auditing | Identity Password Management & IT Self-Service |
   Exchange Server Auditing & Reporting | Active Directory Backup & Recovery
   Tool | SharePoint Reporting & Auditing | File server auditing & data
   discovery | Active Directory Identity Management (AD360) | Application
   Performance Monitoring (APM) | Website Monitoring & Server Monitoring (Cloud)
   | Network Monitoring Software | Bandwidth Monitoring & Traffic Analysis |
   Microsoft 365 Management and Reporting| Mobile device management | Browser
   security & management | Privileged Access Management | Log Management & IT
   Compliance Tool | Unified SIEM Tool & SOAR solution

 
 *  


 * CLOUD EDITION FOR EVENTLOG ANALYZER
   
   Fulfil your logging needs and perform compliance management in the cloud.
   Check out our cloud edition.
   
   Sign up for free
    

Download
 * Overview
 * Email Download Link
 * Features
 * Demo
 * Get Quote
 * Resources
 * Support
 * Customers


 
Email Download Link



LOG MANAGEMENT, AUDITING, AND IT COMPLIANCE
MANAGEMENT MADE EASY.

Collect, monitor, and analyze logs, and comply with regulatory mandates.

Sign up Download
   


EVENTLOG ANALYZER IS TRUSTED BY OVER
8100 CUSTOMERS

           


LOG MANAGEMENT AND BEYOND

 * Security log
   management
 * Network device
   auditing
 * Application
   log analysis
 * Server log
   management
 * Security event
   management
 * Web server log
   management
 * All features
    


SECURITY LOG MANAGEMENT: LEAVE NO LOG UNTURNED

Collect, manage, analyze, correlate, and search through log data from over 750
sources right out of the box using agentless log collection, agent-based log
collection, and log importing. Further, analyze any human-readable log format
with EventLog Analyzer's custom log parser, which automatically reads and
extracts fields and allows you to mark additional fields for better analysis of
unsupported or third-party application log formats. EventLog Analyzer's built-in
syslog server automatically configures and collects syslogs from network
devices, allows you to perform syslog analysis and provides in-depth insights
into security events.

Learn more
 


NETWORK DEVICE MONITORING: START WITH PERIMETER SECURITY

Guard your network perimeter from intrusions by auditing log data from perimeter
devices, including routers, switches, firewall, and IDSs and IPSs. Gain valuable
insights on firewall security policy and rule changes, admin user logons and
logoffs (including failed logons) on critical perimeter devices, changes to
critical user accounts, and more. Spot inbound and outbound traffic from
malicious sources and block it in real time with predefined workflows.

Learn more
 


APPLICATION LOG ANALYSIS: PROTECT WHAT MATTERS

Monitor critical changes, detect data theft, identify attacks, and track
downtime in your business-critical applications, such as databases and web
servers, through application log auditing.

EventLog Analyzer is a database activity monitoring tool that helps ensure the
confidentiality and integrity of your database.

 * SQL database auditing: Track DML and DDL activities, audit user account
   changes and SQL server activities, spot attacks such as SQL injection, view
   account lockouts, and more.
 * Oracle database auditing: Monitor user accesses and activities, audit admin
   account changes and critical activities on servers, and more.

Learn more
 


SERVER LOG MANAGEMENT: ENSURE COMPLETE SERVER SECURITY

Monitor your servers and track critical changes to them in real time. Manage
server logs for your SQL servers, terminals, Oracle servers, print servers, and
other web servers. With EventLog Analyzer's threat detection mechanisms, it is
easier to detect server-related security threats, including port-scan attacks,
unauthorized access on accounts holding sensitive corporate data, and suspicious
activities on devices. You can also monitor server performance and resolve
operational issues.

Learn more
 


SECURITY EVENT MANAGEMENT: MONITOR SECURITY EVENTS IN YOUR NETWORK

Collect, track, monitor, and report security-related events across your network.
EventLog Analyzer is security event management software that analyzes insights
from detected security events and provides sophisticated threat response
techniques with automated workflows. You can also demonstrate compliance with
audit-ready templates for regulations such as HIPAA, GDPR, PCI-DSS, SOX, and
more.

Learn more
 


WEB SERVER LOG MANAGEMENT
AUDIT, MANAGE, AND TRACK WEB SERVER LOGS

EventLog Analyzer is a log analyzer tool that doubles as a(n):

 * IIS log analyzer: Audit Microsoft Internet Information Services (IIS) web
   server events, security errors, configuration changes, and more. Learn more
 * Apache log analyzer: Monitor Apache web server events, security errors,
   insights into attacks, and more.Learn more
 * DHCP log analyzer: Track critical DHCP server events; audit granted, renewed,
   or denied leases; and much more.Learn more

Learn more
 
All features


SUPPORTED LOG SOURCES

Find out the 750 log sources that EventLog Analyzer supports.

Learn more


SECURITY ANALYTICS AND BEYOND

 * FIM
 * Correlation
 * Threat intelligence
 * Incident management
 * Search
 * Compliance
 * Threat investigation
    


FILE INTEGRITY MONITORING ENSURE THE SECURITY OF SENSITIVE DATA

Protect your organization's sensitive data from unauthorized access,
modifications, security threats, and breaches. With EventLog Analyzer's file
integrity monitoring feature, you can track any changes made to files or folders
that contain confidential data in real time to quickly detect critical security
incidents and ensure data integrity.

Deeply analyze file and folder accesses, permission changes, and data value
changes to Windows file servers and Linux servers.

Learn more
 


A REAL-TIME EVENT CORRELATION ENGINE: SECURELY CORRELATE DISPARATE EVENTS

Detect attack attempts and trace potential security threats by correlating log
data from devices across the network with predefined rules and a drag-and-drop
custom correlation rule builder. Be alerted in real time about security threats,
like brute-force attacks, data theft, SQL injection attacks, and suspicious
software installation, by correlating data from different log sources.

Gain insights into security events that triggered a correlation rule in the form
of an incident timeline. Associate a correlation rule or action with workflow
profiles to immediately neutralize the security threat.

Learn more
 


AUGMENTED THREAT INTELLIGENCE USE CONTEXTUAL THREAT FEEDS FOR BETTER SECURITY

Identify malicious IP addresses, URLs, or domain interactions with your network
in real time by automatically correlating log data from devices in your network
with scrutinized threat feeds using our built-in global IP threat database and
advanced threat analytics.

EventLog Analyzer's threat intelligence platform is automatically updated on a
daily basis to help you stay on top of threats and defend your network from the
latest attacks. Get insights into the threat category, the reputation score of
the malicious source, and more with the advanced threat analytics add-on.

Learn more
 


BUILT-IN INCIDENT MANAGEMENT EMPLOY AUTOMATION FOR THREAT RESOLUTION

Efficiently manage security incidents and speed up the resolution process by
automatically assigning tickets to your technicians or administrators using
predefined rules. For every detected incident, raise tickets in centralized ITSM
tools with the help desk software integrations. Expedite threat resolution by
using automated incident workflows that mitigate security threats instantly.

Learn more
 


A POWERFUL SEARCH ENGINE USE FORENSIC ANALYSIS TO UNEARTH SECURITY GAPS

Drill down through terabytes of raw log data and find exactly what you're
looking for with EventLog Analyzer's log search functionality. Conduct basic
search using wild cards, phrases, and boolean operators along with grouped
searches and range searches.

Use the advanced query builder to automatically construct complex queries using
interactive click-based search options and more. Save search results as incident
reports and save queries as Alert Profiles to effectively conduct root cause
analysis and prevent attacks of the same kind from reoccurring.

Learn more
 


INTEGRATED COMPLIANCE MANAGEMENT MEET COMPLIANCE DEMANDS EASILY

Simplify your IT compliance auditing with predefined report templates for
various regulatory mandates, including PCI DSS, HIPAA, FISMA, GDPR, SOX, and ISO
27001. Export comprehensive compliance reports in any format, tweak the existing
compliance auditing report templates, or create custom compliance reports to
meet the demands of future IT regulations. Archive log data for custom time
periods to meet crucial log archival requirements.

Learn more
 


UNIFIED CYBER INVESTIGATION CONSOLE INVESTIGATE AND PROACTIVELY HUNT FOR THREATS
WITH THE INCIDENT WORKBENCH

Enhance efficiency in validating security incidents and conducting thorough
threat investigations by leveraging EventLog Analyzer's Incident Workbench. This
specialized analytical platform focuses on core digital entities like users,
processes, and external threat sources, offering additional contextual data and
risk assement. Users can simply point and probe these entities, and add them to
the analytical console as they traverse through different dashboards of EventLog
Analyzer.

The Incident Workbench incorporates the following integrations:

 * UEBA for user analytics (Log360 integration is required)
 * Advanced Threat Analytics with external threat feeds such as VirusTotal
 * Process hunting trees

Add multiple analytical profiles, and save the instance as evidence to the
incident management console.

Learn more
 


LOOKING FOR A LOG MANAGEMENT SOLUTION? EVENTLOG ANALYZER IS AVAILABLE IN 3
EDITIONS

FREE EDITION

$0Never expires

Free Download
 * Supports up to 5 log sources only
 * Never expire
 * 1. Centralized log collection and archival
   2. Log search based reports
   3. Compliance reports
   4. Log forensic analysis capabilities

PREMIUM

Starts at $595Year

Try Now
 * Supports 10 to 1,000 log source Includes,
 * 1. Centralized log collection and archival
   2. Log search based reports
   3. Compliance reports
   4. Log forensic analysis capabilities

DISTRIBUTED

Starts at $2495 Year

Try Now
 * Supports 50 to unlimited log sources
 * Includes all features of premium edition and supports
 * 1. Scalable environment
   2. Distributed central-collector architecture
   3. Multi-geographical location monitoring
   4. Site-specific reports
   5. Rebranding of the web client for client-specific views


WANT TO MANAGE YOUR LOGS IN THE CLOUD?

Click here for a detailed comparison between on-premise and cloud version.

Try now


ARE YOU AN MSSP? CHECKOUT OUR EVENTLOG ANALYZER MSSP EDITION

Learn more  
IT Compliance & Event Log Management Software for SIEM
 * 
 *  * Your data.Before it's breached.
    * Log360's proactive approach through dark web monitoring
    * Explore now

 * 
 *  * Live Webinar
    * Abusing Windows EFS to steal data using PowerShell
    * Presenter Shehnaaz, Product expert
      Aug 27 at 2 PM AEST (12 PM SGT) Aug 27 at 2 PM GST | 10 AM GMT | 3:30 PM
      IST Aug 27 at 11 AM EDT
    * Register Now

 * A Customers’ Choice in the 2023 Gartner® Peer Insights ‘Voice of the
   Customer’™ for SIEM
   
   One of the four market winners to grab this recognition.
   
   Find out why
   
   Source : Gartner Peer Insights ‘Voice of the Customer’: Security Information
   and Event Management, 3 July 2020
   The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service
   mark of Gartner, Inc. and/or its affiliates and is used herein with
   permission. All rights reserved. Gartner Peer Insights Customers’ Choice
   constitute the subjective opinions of individual end-user reviews, ratings,
   and data applied against a documented methodology; they neither represent the
   views of, nor constitute an endorsement by, Gartner or its affiliates.

 *  * New Feature
    * EventLog Analyzer's Incident Workbench Unified analytical console crafted
      for hassle-free threat investigations
    * Risk profiling Process hunting Evidence building
    * Hunt, analyze, and resolve threats faster
    * Explore now

 1. 
 2. 
 3. 
 4. 
 5. 
 6. 

 * 
 * 


WHAT OUR CUSTOMERS ARE SAYING

Companies of all sizes trust EventLog Analyzer to manage log data efficiently,
comply
with regulatory demands, and secure their network.

TIM TRERISE (IT MANAGER)

America’s Christian Credit Union

 
 * Entertainment  
   
   GUNGHO ONLINE ENTERTAINMENT
   
   See how EventLog Analyzer helps this entertainment organization streamline
   log management for its MMORPG network infrastructure.

 * Education  
   
   NORTHUMBRIA UNIVERSITY
   
   See how EventLog Analyzer helps this educational institution, which has
   around 31,500 students and 3,500 employees, to monitor its network devices
   and ensure the security of confidential data.
   
   LEN HOLLOWAY IT SECURITY ADMIN OF NORTHUMBRIA UNIVERSITY.

 * Finance  
   
   FIRST MOUNTAIN BANK
   
   See how EventLog Analyzer helps First Mountain Bank stay compliant with the
   FDIC's audit requirements.
   
   JIM LLOYD INFORMATION SYSTEMS MANAGER

 * Government  
   
   FLORIDA DEPARTMENT OF TRANSPORTATION
   
   See how EventLog Analyzer enables this government organization to monitor and
   audit its privileged users.

 * Entertainment  
   
   GUNGHO ONLINE ENTERTAINMENT
   
   See how EventLog Analyzer helps this entertainment organization streamline
   log management for its MMORPG network infrastructure.

 * Education  
   
   NORTHUMBRIA UNIVERSITY
   
   See how EventLog Analyzer helps this educational institution, which has
   around 31,500 students and 3,500 employees, to monitor its network devices
   and ensure the security of confidential data.
   
   LEN HOLLOWAY IT SECURITY ADMIN OF NORTHUMBRIA UNIVERSITY.

 1. 
 2. 
 3. 
 4. 

 * 
 * 


5 REASONS TO CHOOSE EVENTLOG ANALYZER

High-speed log processing


HIGH-SPEED LOG PROCESSING

Processes log data at 25,000 logs/second to detect attacks in real time and
conduct quick forensic analysis to reduce the impact of a breach.

Comprehensive log management


COMPREHENSIVE LOG MANAGEMENT

Collects, analyzes, correlates, searches, and archives log data from over 700
log sources. Includes a custom log parser to analyze any human-readable log
format.

Real-time security auditing


REAL-TIME SECURITY AUDITING

Audits network perimeter devices' logs, user activities, server account changes,
user accesses, and a lot more to meet security auditing needs.

Instant threat detection and mitigation


INSTANT THREAT DETECTION AND MITIGATION

Uncover security threats with advanced threat detection mechanisms, such as
event correlation and threat feed analysis, and mitigate them using automated
workflows.

Compliance management


COMPLIANCE MANAGEMENT

Meet regulatory compliance requirements with predefined compliance reports for
PCI DSS, FISMA, GLBA, SOX, HIPAA, ISO 27001, and more.


AWARDS AND RECOGNITIONS

 *  
 *  
 *  
 *  
 *  
 *  
 *  
 *  
 *  
 *  


RESOURCES YOU MIGHT BE INTERESTED IN

 


LOGGING GUIDE

Explore

 * DATASHEET
   
   Real-time log management solution
   
   View now

 * SOLUTION BRIEF
   
   Automating incident response with workflows
   
   View now

 * HOW-TO VIDEOS
   
   Utilizing EventLog Analyzer to the fullest
   
   View now

 


INTERESTED IN A COMPREHENSIVE LOG MANAGEMENT SOLUTION THAT ALSO HELPS MITIGATE
SECURITY THREATS AND MEET COMPLIANCE DEMANDS?

Try it out free for 30 days Schedule a personalized demo


A SINGLE PANE OF GLASS FOR COMPREHENSIVE LOG MANAGEMENT

Log ManagementLog AnalysisIT ComplianceSIEMQuick LinksRelated Products
 * » Agent-less Log Collection
 * » Agent based Log Collection
 * » Importing Event Logs
 * » Windows Event Log Management
 * » VMware ESX/ ESXi Log Monitoring

 * » Applications Log Management
 * » Active Directory Logs auditing
 * » MS IIS - Web Server/ FTP Server Log Monitoring
 * » IBM AS 400/ iSeries Log Monitoring

 * » Cloud Infrastructure Log Monitoring
 * » Universal Log Parsing and Indexing
 * » Log Retention
 * » Syslog Management

 * » Event correlation
 * » Log forensics
 * » Log Search

 * » Security Reports
 * » Custom Report Builder
 * » Privilege User Monitoring and Auditing (PUMA) Reports

 * » Real Time Alerts
 * » Alert Notifications
 * » What is log analysis

 * » PCI DSS Compliance Reports
 * » SOX Compliance Reports
 * » ISO 27001 Compliance Reports
 * » Customizing Compliance Reports

 * » GDPR Compliance Reports
 * » FISMA Compliance Reports
 * » GPG Compliance Reports
 * » Compliance Report Builder

 * » HIPAA Compliance Reports
 * » GLBA Compliance Reports
 * » ISLP Compliance Reports

 * » Log Management
 * » Security Log Management
 * » Server Log Management

 * » STIX/TAXII feed processor
 * » File Integrity Monitoring
 * » Privilege User Monitoring and Auditing (PUMA)

 * » User Authentication
 * » Dashboards & User Specific Views
 * » Rebranding

 * » Demo
 * » Get Quote
 * » Compare Editions

 * » Pricing & Purchase
 * » Let Us Assist You
 * » Logging Guide

 * » What's new?
 * » Awards & Recognition

 * » Unified SIEM tool & SOAR solution
 * » Active Directory Auditing
 * » File server auditing & data discovery
 * » SharePoint Management and Auditing Solution
 * » Integrated Identity & Access Management (AD360)

 * » Active Directory Management & Reporting
 * » Identity security with MFA, SSO, and SSPR
 * » Microsoft 365 Management & Reporting Tool
 * » Cloud Security & Log Management
 * » All Windows AD Tools

 * » Cloud SIEM & Log Management
 * » Exchange Server Auditing & Reporting
 * » Active Directory Backup & Recovery Tool
 * » Active Directory FREE Tools




A SINGLE PANE OF GLASS FOR COMPREHENSIVE THREAT MANAGEMENT

Free Trial Get Quote
Email Download Link
 * Download  
 *  
   Live Demo
 *  
   Video Demo
 *  
   Get Quote
 *  
   Buy Now

 * About us
 * EULA
 * Terms of service
 * Security
 * Compliance
 * Privacy policy
 * Cookie policy
 * Affiliate program
 * Newsletter
 * Contact sales
 * Our offices
 * Global (English)
   

© 2024 Zoho Corporation Pvt. Ltd. All rights reserved.

 

At ManageEngine, we do not use third-party software to track website visitors.
We take your privacy seriously and use our own tools hosted in our data centres.
Your data is yours, and we never monetize it for advertisement purposes. You can
learn more about our cookie policy here and change your preferences at any time.
Manage Cookies
Accept All Cookies
 


COOKIE SETTINGS

 

The options below allow you to manage your consent for the cookies that are set
on this website. You can manage your preference anytime by visiting our cookie
policy or by clicking on the cookie icon at the bottom-left corner of the
webpage.

STRICTLY NECESSARY

Always Active

They are necessary for our website to function and cannot be switched off in our
systems. They are essential in order to enable you to navigate around the
website and use its features. If you remove or disable these cookies from your
browser, we cannot guarantee that you will be able to use our websites.

Learn More

FUNCTIONAL/PREFERENCE

  

They allow us to remember the choices made by you (such as your user name,
language or region) as well as other functionalities (such as controlling the
cookie banner, redirection to a new page) in order to provide a more
personalised online experience. These preferences are remembered (through the
use of persistent cookies) so that you need not set them again the next time you
visit the page.

Note : The live chat widget will not work if the functionality/preference
setting is disabled.

Learn More

ANALYTICS

  

They help us improve the way our websites work (e.g. by ensuring that users are
finding what they are looking for easily). These collect aggregate information
about visits, navigations in the websites so that we can make improvement and
report our performance. Analytics cookies may also be used to test new pages or
features to understand how users adopt them.

Learn More

THIRD-PARTY COMPANY COOKIES

When you visit some of our webpages that contain embedded content hosted on a
third party platform such as YouTube videos, these third parties set cookies on
your browser. We always opt for the most privacy friendly options provided by
these parties, however these are not controlled by us. If you do not want these
parties to set cookies on your browser on visiting our site, you should avoid
visiting webpages that contain such embeds.

Learn More
Save & Exit
Back to Top