Features | ManageEngine Log360 Try now |
Vigilance Managed SIEM | |
---|---|---|---|
Log collection | |||
Agentless | Not specified | ||
Agent based | Not specified | ||
Cross platform log collection | |||
Heterogeneous device support | |||
Import logs | Not specified | ||
Log filter | Not specified | ||
Custom log parser | Not specified | ||
Log collection rate | 20,000 logs/second with peak event handling capacity upto 25,000 logs/second. For Windows event logs the EPS is 2000 logs/second. | Not specified | |
Log formats supported | |||
Windows event log | Not specified | ||
Syslog | Not specified | ||
Amazon Web Services (AWS) EC2 Windows instances | Not specified | ||
Any format – with custom log parsing and indexing technology | Not specified | ||
Application logs supported | |||
Proprietary applications
|
|||
Database applications: Oracle and MS SQL Server |
Not specified | ||
Any in-house or custom application | Not specified | ||
Other devices supported | |||
IBM iSeries (AS/400), And VMware | Not specified | ||
Custom devices
|
|||
Reports | |||
File integrity monitoring | Not specified | ||
Canned reports | Not specified | ||
Custom reports | Not specified | ||
Scheduled reports | Not specified | ||
Report distribution via email | Not specified | ||
Reports in PDF, CSV, and HTML formats | Not specified | ||
Drill down to raw logs | Not specified | ||
Filter using mouse gesture | Not specified | ||
Management specific reports (Ask ME) | Not specified | ||
Trend reports | Not specified | ||
Privileged user activity monitoring reports | Not specified | ||
Active Directory auditing | |||
Reports for user, computer, group, and OU management | Not specified | ||
Reports for auditing other AD object including,
|
Not specified | ||
Reports on attribute value changes (before and after) | Not specified | ||
GPO audit reports | Not specified | ||
Member server auditing | |||
Summary report for member server changes | Not specified | ||
Out-of-the-box reports for
|
Not specified | ||
File Integrity Monitoring | |||
Reports on file integrity monitoring | Not specified | ||
Report scheduling | Not specified | ||
Real-time alerts when critical changes are made to files/folders that are being monitored | Not specified | ||
Audit Trail reports on files/folders changes | Not specified | ||
Compliance reports | |||
Canned reports | Not specified | ||
Customizable reports | Not specified | ||
Reports for new compliance | Not specified | ||
PCI-DSS | |||
ISO 27001:2013 | Not specified | ||
HIPAA | |||
FISMA | |||
SOX | |||
GLBA | |||
Real-time event correlation | |||
Event correlation | |||
Field-level filters to build correlation rules | Not specified | ||
Pre-defined rules to detect various attacks, including ransomware, brute-force and more | |||
User session monitoring | |||
Alerts | |||
Canned | Not specified | ||
Compliance | |||
Correlation | |||
Custom alerting | Not specified | ||
Incident Management | |||
Log search | |||
Advanced search using Boolean, wildcards, grouped search, range search, and phrase search | Not specified | ||
Formatted logs | |||
Raw logs | |||
Save search results as reports and alerts | |||
Log archival | |||
Flexible log retention | Not specified | ||
Secured (Encrypted) | Not specified | ||
Tamper-proof | Not specified | ||
Service Provider feature | |||
User based views | Not specified | ||
User based dashboards | Not specified | ||
Rebranding | Not specified | ||
User Management | |||
Realm & user based access | Not specified | ||
Active Directory based user authentication | Not specified | ||
RADIUS server based user authentication | Not specified | ||
Other Key Features | |||
Incident workflows | |||
UEBA | Not specified | ||
Risk Assessment | |||
Advanced threat analytics | Not specified | ||
Implementation | |||
Easy to install | |||
Web based Client | |||
Appliance | |||
System Requirements | |||
Bundled database (PostgreSQL/MySQL) | Not specified | ||
Windows & Linux platforms support | |||
64 Bit support | |||
Pricing | |||
Pricing basis | Based on the number of servers, devices & applications | Not specified | |
Subscription model | Available | Not specified | |
Perpetual model | Available | Not specified. |
Log360 is a simple yet powerful security information and event management (SIEM) solution that can help enterprises overcome network security challenges and strengthen their cybersecurity posture. The solution helps you mitigate security threats, spot ongoing attack attempts, detect suspicious user activities, and comply with regulatory mandates.
For more information about Log360, please visit
www.manageengine.com/log-management/Your download should begin automatically in 15 seconds. If not, click here to download manually.
Thank you for your interest in ManageEngine Log360. We have received your request for a personalized demo and will contact you shortly.
Disclaimer: ManageEngine does not guarantee the accuracy of any information presented in this document, and there is no commitment, expressed or implied, on ManageEngine’s part to update or otherwise amend this document. The furnishing of this document does not provide any license to patents, trademarks, copyrights or other intellectual property rights owned or held by ManageEngine.