Support Get Quote

Complying with information security level protection (ISLP) made easy by EventLog Analyzer


EventLog Analyzer is a log management tool with a dedicated compliance management module. This module provides ready-made reports for complying with various IT mandates, including the ISLP. To simplify ISLP audits, EventLog Analyzer has predefined reports listed under the various articles of the regulation.

EventLog Analyzer is trusted by over
10000 customers


ISLP Compliance with EventLog Analyzer

Article Compliance aspect Reports
16.3, 13.6 Logons
  • Successful user logons
  • Successful user logoffs
  • Unsuccessful user logons
  • Terminal service session
12, 13, 19.3, 30.4, 30.6, 20.5 Object accesses
  • Object accessed
  • Object created
  • Object modified
  • Object deleted
  • Object handled
16.3, 18.1, 19.3, 30.6 User accesses
  • Individual user action
16.3, 18.1, 19.3, 30.6 Policy changes
  • User policy changes
  • Domain policy changes
  • Audit policy changes
20.2, 20.3 Firewall logons
  • FortiNet failed logons
  • FortiNet failed VPN logons
  • SonicWall failed VPN logons
  • SonicWall denied connections
  • PaloAlto failed logons
  • PaloAlto denied connections
  • Huawei failed logons
  • Huawei denied connection
20.2, 20.3, 20.10 Firewall attacks
  • FortiNet possible attacks
  • FortiNet critical attacks
  • SonicWall critical attacks
  • SonicWall website traffic
  • PaloAlto possible attacks
  • PaloAlto critical attacks
  • Huawei possible attacks
20.2, 20.3, 20.10 Firewall attacks
  • FortiNet possible attacks
  • FortiNet critical attacks
  • SonicWall critical attacks
  • SonicWall website traffic
  • PaloAlto possible attacks
  • PaloAlto critical attacks
  • Huawei possible Attacks
18.1, 20.1, 20.3 Firewall configurations
  • FortiNet configuration changes
  • FortiNet commands failed
16.3, 30.6 Account logon
  • Successful user account validation
  • Unsuccessful user account validation
18.1 Account management
  • User account changes
  • Computer account changes
  • User group changes
12, 13, 19.3, 30.4, 30.6, 20.5 Microsoft SQL/Oracle DDL changes
  • Microsoft SQL database created
  • Microsoft SQL database deleted
  • Microsoft SQL table created
  • Microsoft SQL table dropped
  • Microsoft SQL procedure created
  • Microsoft SQL procedure deleted
  • Microsoft SQL schema dropped
  • Microsoft SQL schema modified
  • Oracle database created
  • Oracle database deleted
  • Oracle table deleted
  • Oracle table modified
  • Oracle procedure created
  • Oracle procedure deleted
  • Oracle cluster deleted
  • Oracle cluster modified
12, 13, 19.3, 30.4, 30.6, 20.5 Microsoft SQL/Oracle DML changes
  • Microsoft SQL table updated
  • Microsoft SQL table deleted
  • Microsoft SQL execute command
  • Microsoft SQL receive command
  • Microsoft SQL schema updated
  • Microsoft SQL schema deleted
  • Oracle table inserted
  • Oracle table deleted
  • Oracle procedure altered
  • Oracle trigger created
  • Oracle trigger deleted
12, 13, 19.3, 30.4, 30.6, 20.5 Microsoft SQL/Oracle security changes
  • Privilege abuse
  • Unauthorized copy
  • Account lockouts
  • SQL injection
  • Denial of service
  • Oracle SQL injection
  • Oracle failed logons
  • Oracle account lockouts
  • Oracle denial of service
12, 13, 19.3, 30.4, 30.6, 20.5 Printer reports
  • Printer documents printed
  • Printer documents deleted
  • Printer paused documents
  • Printer corrupted documents
  • Printer insufficient privilege to print

Built-in support for IT compliances

ISO 27001:2013  FERPA  FISMA  SOX  HIPAA  GLBA  CCPA  NERC CIP  GDPR  ISLP  Cyber Essentials  GPG 13  PDPA 

What else does EventLog Analyzer offer?


    Network device auditing

    Monitor network perimeter devices like firewalls, routers, and switches as these devices helps IT admins to spot and mitigate intrusions, troubleshoot operational issues, and secure the network from attackers. EventLog Analyzer collects, analyzes, correlates, searches, and securely stores logs from all network devices.

    Learn more

    Event correlation

    The solution has a powerful correlation engine, which helps to identify attack patterns within your network. It detects patterns in the logs coming from various network entities that point to possible attacks and promptly notifies you of the threat.

    Learn more

    Compliance violation alerts

    With help of print server reports, organizations can keep track of all activities on the print server, and identify any suspicious patterns in employees' printing habits (as per ISLP article 12, 13, 19.3, 30.4, 30.6, 20.5).

    Learn more

    Threat intelligence

    Anticipate and promptly identify possible security risks, while seamlessly incorporating external threat intelligence sources (STIX, TAXII, and AlienVault OTX) to deliver immediate data on potential threats. These capabilities enable you to stay proactive in the face of evolving threats and respond effectively.

    Learn more

Frequently asked questions

What is ISLP compliance?

The digital data that a company collects and processes plays a pivotal role in that company's business. That's why enterprises can't afford any data compromises, especially their customers' data. One way to ensure that proper measures are in place to counter network security attacks is by complying with IT mandates.

As part of ISLP compliance, a special committee should periodically review the security measures you've implemented to safeguard information and information systems in your organization. Since ISLP has a number of sections and covers a variety of aspects, complying with this regulation could be a challenge without the right tools in place.

Effortlessly meet ISLP requirements with EventLog Analyzer

Download a free trial now!

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

A Single Pane of Glass for Comprehensive Log Management