Home > ManageEngine Log360 vs Vigilance Managed SIEM

Looking for an alternative to
Vigilance Managed SIEM

100000+ Technicians trust Log360 to manage their Windows environment

Try Log360

Thank you for downloading!

Your download should begin automatically in 15 seconds. If not, click here to download manually.

    Download fully functional
    30-days FREE trial!

  • By clicking 'Start a free trial', you agree to processing of personal data according to the Privacy Policy.


One of our solution experts will get in touch with you shortly

ManageEngine Log360 vs Micro focus ArcSight ESM

  • This document provides a feature-wise comparison between ManageEngine Log360 and Vigilance Managed SIEM. The comparison done here is based on the information available on the competitor’s website and the details might vary with the actual product.
  • ManageEngine Log360 is a comprehensive SIEM solution that helps enterprises of all sizes combat threats and mitigate attacks with its threat intelligence, event correlation, file integrity monitoring, network device auditing and user activity monitoring capabilities. On-premises, cloud, or both - Log360 has it covered. It is simple to deploy, has a centralized console to manage multiple environments, and licensed based on the pay only for what you use model.
  • The Intrinium Security Information and Event Management (SIEM) solution utilizes state of the art hardware to collect, analyze and store logs from your digital environment. In conjunction with the digital tools, Intrinium are committed to real-time analysis, monitoring, detecting and responding to security alerts 24x7x365 to allow your business optimal productivity.

ManageEngine Log360

Features ManageEngine Log360
Try now
Vigilance Managed SIEM
Log collection
Agentless   Not specified
Agent based   Not specified
Cross platform log collection    
Heterogeneous device support    
Import logs   Not specified
Log filter   Not specified
Custom log parser   Not specified
Log collection rate 20,000 logs/second with peak event handling capacity upto 25,000 logs/second. For Windows event logs the EPS is 2000 logs/second. Not specified
Log formats supported
Windows event log   Not specified
Syslog   Not specified
Amazon Web Services (AWS) EC2 Windows instances   Not specified
Any format – with custom log parsing and indexing technology   Not specified
Application logs supported
Proprietary applications
  • Microsoft IIS Web Server
  • FTP Server (W3C logs)
  • Apache Web Server
  • DHCP Windows
  • DHCP Linux
Database applications:
Oracle and MS SQL Server
  Not specified
Any in-house or custom application   Not specified
Other devices supported
IBM iSeries (AS/400), And VMware   Not specified
Custom devices
  • Firewalls
  • Intrusion Detection System/ Intrusion Prevention System (IDS/IPS)
  • Anti-virus application
  • Mail and web application
  • Vulnerability Scanners
  • Unified threat management solutions
    • Symantec DLP Application
    • FireEye
    • Symantec Endpoint Solution
File integrity monitoring   Not specified
Canned reports   Not specified
Custom reports   Not specified
Scheduled reports   Not specified
Report distribution via email   Not specified
Reports in PDF, CSV, and HTML formats   Not specified
Drill down to raw logs   Not specified
Filter using mouse gesture   Not specified
Management specific reports (Ask ME)   Not specified
Trend reports   Not specified
Privileged user activity monitoring reports   Not specified
Active Directory auditing
Reports for user, computer, group, and OU management   Not specified
Reports for auditing other AD object including,
  • DNS
  • Permission
  • Schema
  • Contacts
  • Container configuration
  • Domain changes
  Not specified
Reports on attribute value changes (before and after)   Not specified
GPO audit reports   Not specified
Member server auditing
Summary report for member server changes   Not specified
Out-of-the-box reports for
  • Policy changes
  • System events
  • Object management
  • Scheduled tasks
  Not specified
File Integrity Monitoring
Reports on file integrity monitoring   Not specified
Report scheduling   Not specified
Real-time alerts when critical changes are made to files/folders that are being monitored   Not specified
Audit Trail reports on files/folders changes   Not specified
Compliance reports
Canned reports   Not specified
Customizable reports   Not specified
Reports for new compliance   Not specified
ISO 27001:2013   Not specified
Real-time event correlation
Event correlation    
Field-level filters to build correlation rules   Not specified
Pre-defined rules to detect various attacks, including ransomware, brute-force and more    
User session monitoring    
Canned   Not specified
Custom alerting   Not specified
Incident Management    
Log search
Advanced search using Boolean, wildcards, grouped search, range search, and phrase search   Not specified
Formatted logs    
Raw logs    
Save search results as reports and alerts    
Log archival
Flexible log retention   Not specified
Secured (Encrypted)   Not specified
Tamper-proof   Not specified
Service Provider feature
User based views   Not specified
User based dashboards   Not specified
Rebranding   Not specified
User Management
Realm & user based access   Not specified
Active Directory based user authentication   Not specified
RADIUS server based user authentication   Not specified
Other Key Features
Incident workflows    
UEBA   Not specified
Risk Assessment    
Advanced threat analytics   Not specified
Easy to install    
Web based Client    
System Requirements
Bundled database (PostgreSQL/MySQL)   Not specified
Windows & Linux platforms support    
64 Bit support    
Pricing basis Based on the number of servers, devices & applications Not specified
Subscription model Available Not specified
Perpetual model Available Not specified.

Can the solution be considered value for money?

Component-based pricing model.
Starts at $595* per year

What customers say about us

  • CAMH will be able to save close to $26,000 a year on service desk calls related to Active Directory password resets and locked accounts, and will see a return on investment within the first six months of product implementation.

    Judy OlivierProject Manager, CAMH

About ManageEngine Log360

Log360 is a simple yet powerful security information and event management (SIEM) solution that can help enterprises overcome network security challenges and strengthen their cybersecurity posture. The solution helps you mitigate security threats, spot ongoing attack attempts, detect suspicious user activities, and comply with regulatory mandates.

For more information about Log360, please visit


Thank you for downloading!

Your download should begin automatically in 15 seconds. If not, click here to download manually.

Download fully functional30-days FREE trial!

    By clicking 'Claim Your Free Trial', you agree to processing of personal data according to the Privacy Policy.

Thank you

Thank you for your interest in ManageEngine Log360. We have received your request for a personalized demo and will contact you shortly.

Schedule apersonalized web demo

  • By clicking 'Submit', you agree to processing of personal data according to the Privacy Policy.

Disclaimer: ManageEngine does not guarantee the accuracy of any information presented in this document, and there is no commitment, expressed or implied, on ManageEngine’s part to update or otherwise amend this document. The furnishing of this document does not provide any license to patents, trademarks, copyrights or other intellectual property rights owned or held by ManageEngine.