SIEM en la nube de ManageEngine : Log360 Cloud

Obtenga una visibilidad incomparable, detecte amenazas en tiempo real y garantice el cumplimiento con la plataforma de análisis y monitoreo de seguridad.

Más de 280.000 organizaciones en 190 países confían en ManageEngine para gestionar su TI

Over 280,000 organizations across 190 countries trust ManageEngine to manage their IT
Collect logs
 

Collect logs

Ingest log data from various sources, including Windows and Linux servers, endpoints, databases, business apps, cloud environment, and more.

Audit reports
 

Audit reports

Investigate critical security incidents thoroughly by examining who performed actions, their location, and the timestamps, all facilitated by predefined security audit reports

Detect threats
 

Detect threats

Instantly identify complex threats by correlating events across your entire network. The engine analyzes logs in real-time, triggering alerts on suspicious patterns and anomalies.

Behavior analytics
 

Behavior analytics

Proactively hunt for slow-moving and evasive attacks. ML-powered analytics continuously learns and adapts, identifying patterns that bypass traditional rule-based security

Investigate threats
 

Investigate threats

Accelerate incident response with enriched context. The workbench consolidates user, device, and threat intelligence, providing a comprehensive view for rapid investigation.

Protect cloud apps
 

Protect cloud apps

Track cloud app usage, detect shadow IT, and enforce security policies. Monitor both sanctioned and unsanctioned apps to safeguard sensitive data.

 
 
 

¿Qué es un SIEM en la nube?

Una solución SIEM basada en la nube proporciona funcionalidades de SIEM como un servicio. Las soluciones de SIEM en la nube protegen su red; proporcionan información sobre amenazas; ofrecen una consola para detectar, priorizar y resolver incidentes de seguridad; y le ayudan a cumplir con los mandatos normativos―todo desde la nube. Las soluciones SIEM en la nube ofrecen mayor flexibilidad y facilidad de acceso a la hora de gestionar la ciberseguridad tanto en entornos on-premises como en la nube.

Log360 Cloud es la solución SIEM basada en la nube de ManageEngine que tiene como objetivo proporcionar visibilidad integral y gestión de seguridad en entornos on-premises y en la nube en una sola plataforma.

Obtenga más información sobre los beneficios únicos de usar Log360 Cloud

Cloud-based SIEM for enhanced
security and compliance

  • Cloud log management
  • Threat detection
  • UEBA
  • Threat intelligence
  • Cloud compliance
  • Identity security

Unparalleled security visibility from log analysis

Experience the power of cloud-based log management with Log360 Cloud. Gain deep insights into security, access, system, and application logs across your network. With Log360 Cloud, you can:

  • Streamline log collection and storage: Automatically and securely collect and store logs from Windows servers, syslog sources, applications, and cloud platforms.
  • Conduct thorough log analysis: Leverage advanced search and correlation capabilities to quickly identify and investigate security events.
  • Ensure compliance: Securely archive log data for forensic analysis and regulatory mandates using our flexible storage options. Leverage pricing plans to optimize log storage costs while securely archiving log data.
Explore cloud log management 
Unparalleled security visibility from log analysis
Plug-and-play detection rules for sophisticated threats

Plug-and-play detection rules for sophisticated threats

Detect threats, attack patterns, and techniques with effective log correlation and anomaly rules. With Log360 Cloud, you can:

  • Get real-time alerts: Instantly receive alerts for known threats and indicators of compromise via over 100 predefined correlation rules.
  • Leverage anomaly detection: Take advantage of predefined anomaly detection rules, or customize your own based on time, pattern, and count to detect unusual behavior that could signal insider threats or other sophisticated attacks.
  • Streamline threat intelligence ingestion: Automate threat feed integration and customize correlation rules for accurate, contextual detection.
  • Tailor threat detection: Use our intuitive Correlation Rule Builder to create or modify rules for detecting unauthorized access, lateral movements, and other sophisticated attacks.
Explore Log360 Cloud's correlation rule library 

Anomaly detection

Go beyond traditional rule-based detection by identifying deviations in user and entity behavior patterns using anomaly rules. Detect potential insider threats like logon anomalies, compromised accounts, and data exfiltration attempts, before they escalate. With UEBA, you can:

  • ML-based anomaly detection: Automatically detect deviations from normal behavior using machine learning algorithms.
  • Accurate detection: Identify threats based on time, count, and pattern anomalies for higher precision.
  • Proactive threat identification: Uncover anomalous behavior such as unusual logins or file transfers early on.
  • Integrated risk scoring: Identify high-risk users and entities with scores based on triggered anomalies and predefined behavioral indicators.
  • Custom anomaly rule creation: Create single or bulk anomaly rules tailored to your environment.
Anomaly detection
Preconfigured threat intelligence and advanced threat analytics

Preconfigured threat intelligence and advanced threat analytics

Empower your defenses with a threat intelligence database featuring over 600 million malicious URLs, domains, and IP addresses. With Log360 Cloud's integrated platform, you get:

  • Seamless integration with threat data: Connect effortlessly with STIX/TAXII-formatted threat feeds for industry-specific coverage.
  • Real-time insights: Benefit from BrightCloud-powered analytics that provide reputation scores and threat types for malicious entities.
  • Enhanced security analytics: Integrate dynamic threat data into our detection engine for faster, more effective responses.

Audit-ready compliance reports and violation alerts

Log360 Cloud streamlines compliance while enhancing your security posture. It provides:

  • Effective compliance management: Use pre-built audit report templates (PCI DSS, GLBA, FISMA, SOX, HIPAA, ISO 27001, etc.) to demonstrate adherence to security standards, while securely storing log data in the cloud—eliminating costly hardware.
  • Continuous monitoring & remediation: Proactively monitor compliance with dedicated dashboards, identify gaps, and implement timely fixes.
  • Enhanced audit trails: Maintain detailed logs of user activity to swiftly detect and respond to suspicious access or data breaches.
Explore cloud compliance 
Audit-ready compliance reports and violation alerts
In-depth Active Directory auditing and monitoring

In-depth Active Directory auditing and monitoring

Protect identities during your cloud transition with Log360 Cloud. By monitoring Active Directory, it helps you:

  • Granularly audit user activity: Gain deep visibility into authentication events and detect potential intrusion attempts or impersonation.
  • Monitor critical AD changes in real time: Instantly identify modifications to OUs, GPOs, and permissions to preempt insider threats.
  • Detect identity-based attacks: Continuously monitor for privilege escalations, lateral movements, and credential stuffing.
  • Automate user behavior monitoring: Automatically flag unusual account activities—such as frequent lockouts or logins from disparate locations—to catch threats early.
Explore real-time AD auditing 

¿Es usted un MSSP?

Mejore sus servicios de seguridad con Log360 Cloud MSSP. Implemente una gestión centralizada de registros, análisis de amenazas y gestión del cumplimiento normativo a escala.

Pruébalo gratis

Empiece con 50 GB gratis

No se requiere tarjeta de crédito.

Free plan

$0

  • 50 GB de almacenamiento de búsqueda predeterminado
  • 150 GB de almacenamiento de archivo predeterminado (3 veces el almacenamiento de búsqueda)
  • Retención de búsqueda de 7 días
  • 15 días de conservación en archivo
Plan Basic

$120

+
GB
GB
  • 50 GB de almacenamiento de búsqueda predeterminado
  • 150 GB de almacenamiento de archivo predeterminado (3 veces el almacenamiento de búsqueda)
  • Retención de búsqueda de 30 días
  • 90 días de conservación de archivos
  • 20 perfiles de alerta
  • Nota: El almacenamiento de archivo es gratuito, triplicando el almacenamiento de búsqueda. Se puede adquirir almacenamiento de archivo adicional si es necesario.

Complementos

Plan Standard

$540

+
GB
GB
  • 50 GB de almacenamiento de búsqueda predeterminado
  • 150 GB de almacenamiento de archivo predeterminado (3 veces el almacenamiento de búsqueda)
  • Retención de búsqueda de 60 días
  • 180 días de conservación de archivos
  • 50 perfiles de alerta
  • 10 reglas de correlación
  • Nota: El almacenamiento de archivo es gratuito, triplicando el almacenamiento de búsqueda. Se puede adquirir almacenamiento de archivo adicional si es necesario.

Complementos

Plan Professional

$840

+
GB
GB
  • 50 GB de almacenamiento de búsqueda predeterminado
  • 150 GB de almacenamiento de archivo predeterminado (3 veces el almacenamiento de búsqueda)
  • Retención de búsqueda de 90 días
  • Retención de archivos personalizable
  • 70 perfiles de alerta
  • 20 niveles de almacenamiento
  • 20 reglas de correlación
  • 20 reglas de anomalía
  • Sobrescribir logs antiguos
  • Nota: El almacenamiento de archivo es gratuito, triplicando el almacenamiento de búsqueda. Se puede adquirir almacenamiento de archivo adicional si es necesario.

Complementos

Para más de 20 000 GB (20 TB) de almacenamiento, comuníquese con nuestro equipo de ventas en latam-sales@manageengine.comObtenga una cotización personalizada

Key offerings of Log360 Cloud’s SIEM technology

Experience the transformative power of cloud-based log management with Log360 Cloud.

Know more 
01
05
 

Unified SIEM solution

Experience a unified cybersecurity platform that combines advanced correlation techniques for threat detection, robust CASB features for cloud data security, and streamlined compliance through effective auditing and monitoring. Our cloud-native SIEM empowers organizations to achieve seamless security operations and protect their valuable assets.

02
05
 

AI-powered threat insights

Equip your security team for smarter threat response with Zia Insights in Log360 Cloud. This AI-driven feature delivers concise, contextual summaries of security events, maps threats to MITRE ATT&CK® techniques, and provides precise mitigation guidance, enabling faster, more confident incident investigation and response.

Learn more 
03
05
 

CASB: Full visibility and control over cloud

Gain complete control over your cloud environment with Log360 Cloud’s CASB. Monitor cloud application usage to identify unauthorized shadow IT, gain deep insights into user activity, and quickly detect potential threats. Integrating CASB with cloud-based SIEM helps uncover shadow applications and build actionable context around threat actor behavior.

Learn more 
04
05
 

Security platform: Flexibility to build security your way

Take full control of your security with Log360's unified platform approach. Seamlessly integrate your security tools through Open APIs, visualize data exactly how you need it, and extend functionality with custom extensions to meet your evolving needs. Build a security ecosystem that works exactly how you want it to work.

Learn more 
05
05
 

Cloud-based log storage: No upfront costs

Benefit from intuitive log collection, analysis, search, and storage with Log360 Cloud. Perform high-speed searches and meet compliance retention requirements using a flexible pricing plan paired with adaptive storage options. This scalable, cost-effective solution eliminates the need for upfront hardware investments and ongoing infrastructure maintenance.

Learn more 

Resources

What's Log360 Cloud?
PDF DOCUMENT

What's Log360 Cloud?

Learn more
 
Unique benefits of Log360 Cloud
ONLINE

Unique benefits of Log360 Cloud

Learn more
 
Log storage calculator
ONLINE

Log storage calculator

Learn more
 

Preguntas frecuentes sobre Log360 Cloud SIEM::

¿Qué es SIEM-as-a-service?

SIEM-as-a-service (Security Information and Event Management) es una solución basada en la nube que proporciona análisis en tiempo real de las alertas de seguridad generadas por diversas aplicaciones y hardware de red.

Las características principales incluyen:

  • Recopilación y agregación de logs de múltiples fuentes
  • Detección y alerta de amenazas en tiempo real
  • Capacidades de respuesta automatizada a incidentes
  • Informes y gestión de cumplimiento
  • Infraestructura de nube escalable administrada por el proveedor de servicios

Cloud SIEM elimina la necesidad de que las organizaciones mantengan una infraestructura SIEM local compleja, ofreciendo una solución de seguridad más flexible y, a menudo, más rentable.

¿Cuándo deberían las organizaciones elegir SIEM en la nube en lugar de SIEM local?

Las organizaciones deberían considerar SIEM en la nube en lugar de soluciones locales en los siguientes escenarios:

  • Recursos de TI limitados: cuando hay una falta de experiencia interna para administrar una infraestructura SIEM compleja.
  • Consideraciones de costos: para evitar grandes gastos de capital iniciales en licencias de hardware y software.
  • Necesidades de escalabilidad: para empresas que experimentan un crecimiento rápido o una demanda fluctuante.
  • Fuerza laboral distribuida: para brindar un mejor apoyo a los empleados en múltiples ubicaciones.
  • Implementación más rápida: cuando existe la necesidad de implementar capacidades SIEM rápidamente.
  • Deseo de actualizaciones continuas: para beneficiarse de la información sobre amenazas y actualizaciones de funciones más recientes sin intervención manual.
  • Requisitos de cumplimiento: Para cumplir más fácilmente con los estándares regulatorios que requieren una gestión de logs sólida y un monitoreo de seguridad.

Para decidir entre un SIEM local y uno en la nube, lea nuestro blog detallado sobre el tema aquí.

¿Cómo garantiza Log360 Cloud la seguridad de mis datos de log?

Log360 Cloud employs multiple layers of security to protect your sensitive log data:

  • Encryption: All data is encrypted both in transit and at rest using industry-standard encryption protocols.
  • Access controls: Strict role-based access controls and multi-factor authentication are implemented to prevent unauthorized access.
  • Data isolation: Each customer's data is logically segregated to ensure data privacy.
  • Compliance: The service adheres to major compliance standards, including ISO/IEC 27001, 27017, and 27018; SOC 2 (including SOC 2 + HIPAA); SOC 1 (SSAE 18 & ISAE 3402 Type II); and ISO 9001:2015.
  • Regular audits: Periodic security audits and penetration testing are conducted to identify and address potential vulnerabilities.
  • Redundancy: Data is replicated across multiple secure data centers to ensure high availability and disaster recovery capabilities.
  • Secure APIs: All integrations and data transfers use secure APIs with proper authentication mechanisms.
  • Monitoring: Continuous monitoring of the cloud infrastructure for any security anomalies or potential threats.

Comience a gestionar logs en la nube de
forma segura en cuestión de minutos

Ebook: Reforzando la seguridad en la nube con CASB - ManageEngine Log360 Cloud

Para una gestión de activos fácil y efectiva en la que confían las siguientes empresas