- Free Edition
- What's New?
- Key Highlights
- Suggested Reading
- All Capabilities
-
Log Management
- Event Log Management
- Syslog Management
- Log Collection
- Agent-less Log Collection
- Agent Based Log collection
- Windows Log Analysis
- Event Log Auditing
- Remote Log Management
- Cloud Log Management
- Security Log Management
- Server Log Management
- Linux Auditing and Reporting
- Auditing Syslog Devices
- Windows Registry Auditing
- Privileged User Activity Auditing
-
Application Log Management
- Application Log Monitoring
- Web Server Auditing
- Database Activity Monitoring
- Database Auditing
- IIS Log Analyzer
- Apache Log Analyzer
- SQL Database Auditing
- VMware Log Analyzer
- Hyper V Event Log Auditing
- MySQL Log Analyzer
- DHCP Server Auditing
- Oracle Database Auditing
- SQL Database Auditing
- IIS FTP Log Analyzer
- IIS Web Log Analyzer
- IIS Viewer
- IIS Log Parser
- Apache Log Viewer
- Apache Log Parser
- Oracle Database Auditing
-
IT Compliance Auditing
- ISO 27001 Compliance
- HIPAA Compliance
- PCI DSS Compliance
- SOX Compliance
- GDPR Compliance
- FISMA Compliance Audit
- GLBA Compliance Audit
- CCPA Compliance Audit
- Cyber Essentials Compliance Audit
- GPG Compliance Audit
- ISLP Compliance Audit
- FERPA Compliance Audit
- NERC Compliance Audit Reports
- PDPA Compliance Audit reports
- CMMC Compliance Audit
- Reports for New Regulatory Compliance
- Customizing Compliance Reports
-
Security Monitoring
- Threat Intelligence
- STIX/TAXII Feed Processor
- Threat Whitelisting
- Real-Time Event Correlation
- Log Forensics
- Incident Management System
- Automated Incident Response
- Linux File Integrity Monitoring
- Detecting Threats in Windows
- External Threat Mitigation
- Malwarebytes Threat Reports
- FireEye Threat Intelligence
- Application Log Management
- Security Information and Event Management (SIEM)
- Real-Time Event Alerts
- Privileged User Activity Auditing
-
Network Device Monitoring
- Network Device Monitoring
- Router Log Auditing
- Switch Log Monitoring
- Firewall Log Analyzer
- Cisco Logs Analyzer
- VPN Log Analyzer
- IDS/IPS Log Monitoring
- Solaris Device Auditing
- Monitoring User Activity in Routers
- Monitoring Router Traffic
- Arista Switch Log Monitoring
- Firewall Traffic Monitoring
- Windows Firewall Auditing
- SonicWall Log Analyzer
- H3C Firewall Auditing
- Barracuda Device Auditing
- Palo Alto Networks Firewall Auditing
- Juniper Device Auditing
- Fortinet Device Auditing
- pfSense Firewall Log Analyzer
- NetScreen Log Analysis
- WatchGuard Traffic Monitoring
- Check Point Device Auditing
- Sophos Log Monitoring
- Huawei Device Monitoring
- HP Log Analysis
- F5 Logs Monitoring
- Fortinet Log Analyzer
- Endpoint Log Management
- System and User Monitoring Reports
-
Log Management
- Product Resources
- Related Products
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- ADSelfService Plus Identity security with MFA, SSO, and SSPR
- DataSecurity Plus File server auditing & data discovery
- Exchange Reporter Plus Exchange Server Auditing & Reporting
- M365 Manager Plus Microsoft 365 Management & Reporting Tool
- RecoveryManager Plus Enterprise backup and recovery tool
- SharePoint Manager Plus SharePoint Reporting and Auditing
- AD360 Integrated Identity & Access Management
- AD Free Tools Active Directory FREE Tools
In today's evolving threat landscape, the key to efficient threat mitigation is early threat detection, and the key to this process is access to up-to-date, global threat information. However, organizations don't possess this kind of information in house. Structured Threat Information eXpression (STIX)/Trusted Automated eXchange of I ntelligence Information (TAXII) protocols emerged to fill this gap, providing globally applicable standards for identifying and sharing threat information.
One of the greatest strengths of EventLog Analyzer's threat i ntelligence platform is its support for STIX/TAXII protocols. EventLog Analyzer processes STIX/TAXII-based feeds to alert you in real time when globally blocklisted IPs and URLs interact with your network.
STIX
STIX provides a common language for describing cyberthreat information so it can be shared, stored, and otherwise used in a consistent manner that facilitates automation. STIX helps defend networks and systems against cyberthreats by giving cyber defenders, cyberthreat analysts, malware analysts, security tool vendors, security researchers, and threat sharing communities access to standardized threat information.
TAXII
TAXII is a community effort to standardize the trusted, automated exchange of cyberthreat information. TAXII defines a set of services and message exchanges that, when implemented, enable organizations to share actionable cyberthreat information with one another.
The formats of STIX/TAXII
EventLog Analyzer's threat i ntelligence platform supports two different formats of the STIX/TAXII protocol, namely, STIX 1/TAXII 1.0 and its successors, STIX 2/TAXII 2.0 and STIX 2.1/TAXII 2.1.
The first version of the STIX standard is referred to as STIX 1/TAXII 1.0. To represent and exchange threat i ntelligence data, STIX 1/TAXII 1.0 mainly uses extensible markup language (XML). However, STIX 1/TAXII 1.0 has certain limitations. STIX 1/TAXII 1.0 was difficult to work with and comprehend due to its verbose and complex data model. The data model was simplified using STIX 2/TAXII 2.0 and STIX 2.1/TAXII 2.1, which improved its usability and intuitiveness.
Considering these limitations and to meet the demands of organizations, EventLog Analyzer has expanded its support for STIX 2/TAXII 2.0 and STIX 2.1/TAXII 2.1 versions. They offer a more adaptable, interoperable, and contemporary architecture for representing and exchanging cybersecurity threat i ntelligence. JavaScript Object Notation (JSON) is the primary format used by these versions to represent threat i ntelligence data. Also, STIX 2 provides rich threat i ntelligence data through its structured and standardized data model, which allows for the representation and sharing of a wide range of information about cyberthreats.
EventLog Analyzer offers quick-deploy integration with the following vendors:
The threat i ntelligence feeds listed below come from reputable suppliers. They update their feeds frequently in order to offer better service over time. These feeds are filled with detailed threat i ntelligence information that may be used to understand attackers better, react to incidents more quickly, and anticipate a threat actor's next move. EventLog Analyzer is the best choice to swiftly deploy these services.
AlienVault OTX
Learn more about AlienVault OTX API, and sign up to receive an API key.
Cyware Threat I ntelligence
Learn more about Cyware Threat I ntelligence Feeds. To receive credentials, sign up here.
IBM X-Force
Learn more about the IBM X-Force integration. To purchase this integration, please contact IBM.
Kaspersky
Learn more about Kaspersky Threat Feeds. To purchase this integration, please contact Kaspersky.
PulseDive
Learn more about PulseDive. To purchase this integration, please contact PulseDive.
Sectrio
Learn more about Sectrio. To purchase this integration, please contact Sectrio.
SecAlliance- ThreatMatch I ntelligence
Learn more about ThreatMatch. To purchase this integration, please contact ThreatMatch.
Other features
Syslog management
Collect and analyze Syslog data from routers, switches, firewalls, IDS/IPS, Linux/Unix servers, and more. Get in-depth reports for every security event. Receive real-time alerts for anomalies and breaches.
Windows event log monitoring
Analyze event log data to detect security events such as file/folder changes, registry changes, and more. Study DDoS, Flood, Syn, and Spoof attacks in detail with predefined reports.
IT compliance management
Comply with the stringent requirements of regulatory mandates viz., PCI DSS, FISMA, HIPAA, and more with predefined reports & alerts. Customize existing reports or build new reports to meet internal security needs.
Active Directory Log Monitoring
Monitor all types of log data from Active Directory infrastructure. Track failure incidents in real-time and build custom reports to monitor specific Active Directory events of your interest.
Privileged user monitoring
Monitor and track privileged user activities to meet PUMA requirements. Get out-of-the-box reports on critical activities such as logon failures, reason for logon failure, and more.
Print Server Management
Monitor and audit print server with detailed reports on documents printed, attempts to print documents without proper permission, failed print jobs and their causes, and more.
Need Features? Tell Us
If you want to see additional features implemented in EventLog Analyzer, we would love to hear. Click here to continue