Support
 
Support Get Quote
 
 
 
 

Know the Difference

EventLog Analyzer Product Comparison

EventLog Analyzer is available in two editions viz., Premium and Distributed Edition.

Free Edition of EventLog Analyzer can be used to monitor upto 5 log sources.

Features Free Edition * Premium Distributed
Multiple OS Support Available Available Available
Monitored Device Support
(Windows, Linux, Unix, AIX, Routers, Switches, VMWare,
Any Syslog device)
Available Available Available
Customizable dashboard widgets Available Available Available
Log search using boolean operator, phrase, value ranges, wildcards & grouped search Available Available Available
FTP Active Mode support for log file import Available Available Available
Import and Analyze Event files Available Available Available
Auto Discovery of Hosts Available Available Available
Filter Events before Storing in Database Available Available Available
Compressed Archives Available Available Available
Archive log files encryption Available Available Available
Hashing and Time stamping of Archive log files Available Available Available
Real-time Display of Events Available Available Available
Automated Alerts Available Available Available
Authorized Access Available Available Available
Host Grouping for Policy Implementation Available Available Available
Schedule Data Collection Available Available Available
Custom Reports Available Available Available
Scheduling Reports Available Available Available
PUMA Reports Available Available Available
Multiple Report Formats Available Available Available
Multi-level Drilldown Available Available Available
Trend Analysis Available Available Available
Security Analysis Available Available Available
Compliance Reports (EventLog & Syslog) (Predefined and Customization) Available Available Available
Command Execution on Alerts Available Available Available
SMS and SNMP Trap Notification for Alerts Available Available Available
Internationalization Support to handle Native Logs Available Available Available
Export/Import of Alert, Report, and Filter Profiles Available Available Available
Advanced Search in Raw Logs, Save Result as Report Profile Available Available Available
Scheduled import from local and remote (FTP/SFTP) machines Available Available Available
Log collection during log collector down time Available Available Available
Monitoring Users Accessing EventLog Analyzer Application Available Available Available
File Integrity Monitoring   Available Available
Site specific reports     Available
Multi-geographical location monitoring with distributed central-collector     Available
Scalable architecture     Available
Log field extraction using an interactive regular expression (regex) syntax builder   Available Available
Universal log parsing and indexing (ULPI) to support any log format (Human Readable & non-encrypted log formats)   Available Available
Import users from Active Directory groups   Available Available
Agent for log collection across WAN/Firewalls   Available Available
Import of saved Syslog Files   Available Available
Re-branding Web Client   Available Available
Instant Reports   Available Available

Analyze Application specific Logs

  • MS IIS Web server
  • MS IIS FTP servers
  • DHCP Windows server
  • DNCP Linux server
  • MS SQL database
  • Oracle database
  • Apache Web server
  • Print server
  Available Available
Support for MS SQL Server and MS SQL Cluster as Backend Database   Available Available
Custom View & User based Views   Available Available
Active Directory & RADIUS Server based Third Party User Authentication   Available Available
IBM AS/400 Logs Analysis (V5R series) Filter, Report, Alert, Archive & Import   Available Available
Real-Time Event Correlation   Available Available
Windows Terminal Server Log Monitoring   Available Available
User Session Monitoring   Available Available
*Free Edition Monitors Upto 5 log sources
Customer Speaks
  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
     
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
     
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
     
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • I love the alerts feature of the product. We are able to send immediate alerts based on pretty much anything we can think of. We send alerts when certain accounts login, or when groups are changed, etc. That has been very helpful. Also the automatic archive of the log files has been very helpful and has taken the worry out of keeping old logs. The “Ask Me” function is very nice as well. It is great to have some natural language queries built in where you can just click a button and get an answer.
     
    Jim Earnshaw
    Senior Computer Specialist
    Department of Chemistry
    University of Washington
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
     
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

EventLog Analyzer Trusted By

A Single Pane of Glass for Comprehensive Threat Management