Event log analyzer

EventLog Analyzer is an  IT Compliance & Event Log Management Software for SIEM

Your organizations IT infrastructure generate huge amount of logs every day and these machine generated logs have vital information that can provide powerful insights and network security intelligence into user behaviors, network anomalies, system downtime, policy violations, internal threats, regulatory compliance, etc. However, the task of analyzing these event logs and syslogs without automated log analyzer tools can be both time-consuming and painful if done manually.

EventLog Analyzer provides the most cost-effective Security Information and Event Management (SIEM)software on the market. Using this Log Analyzer software, organizations can automate the entire process of managing terabytes of machine generated logs by collecting, analyzing, searching, reporting, and archivingfrom one central location. This event log analyzer software helps to mitigate internal threats, monitor file integrity, conduct log forensics analysis, monitor privileged users and comply to different compliance regulatory bodies by intelligently analyzing your logs and instantly generating a variety of reports like user activity reports, regulatory compliance reports, historical trend reports, and more.

What problems does it solve?

  • How GungHo Online Entertainment Streamlines Log Management for its MMORPG Network Infrastructure with EventLog Analyzer

    ManageEngine EventLog Analyzer enables Benefit One Inc. to achieve 20% reduction in overall IT Spending

    EventLog Analyzer helps First Mountain Bank stay Compliant with The Federal Deposit Insurance Corporation (FDIC) Audit Requirements

    Florida Department of Transportation uses EventLog Analyzer for Privileged User Monitoring & Audit (PUMA)

    How TRC Companies, Inc. addressed the SOX compliance audit requirement?

Unlock the Real Value of your Machine Generated Logs

Centralized Log Collection

  • Agentless log collection (optional agents available)
    Collects logs from heterogeneous sources (Windows systems, Unix/Linux systems, Applications, Databases, Routers, Switches and other Syslog devices) at a centralized location

Compliance Reports

  • Generate pre-defined/canned compliance reports for Event logs & Syslogs, to meetHIPAA, GLBA, PCI DSS, SOX, FISMA and more Provides value added new feature to create custom report for new compliance to help comply with growing new regulatory acts demanding compliance in future


Universal Log Parsing & Indexing

  • Decipher any log data regardless of the source and log format
  • Allows you to index any machine-generated logs (provided it is in human readable, non-encrypted format) by defining and extracting log fields of your choice using regular expression (regex) patterns

File Integrity Monitoring

  • Centrally track all changes and get real time alerts when files and folders are created, accessed, viewed, deleted, modified, renamed, etc.
  • Get a complete audit trail of all the changes that happen on files and folders. Audit trail answers the 'what, when, where and how' of all changes in real-time!

Privileged User Monitoring

  • Collects and analyzes all events on privileged user activities
  • Get precise information of user access such as which user performed the action, what was the result of the action, on which server it happened and track down the user workstation from where the action was triggered

Log Search

  • Search for anything, not just a handful of pre-indexed fields, and quickly detect network anomalies - misconfigurations, viruses, user activities, system/applications errors, etc.
  • Conduct a search using Wild-cards, Phrasesand Boolean operators
  • Users can also conduct Grouped searches andRange searches.

Real-time Alerting

  • Automatic alerting allows you to receive real-time alert notifications directly via Email, SMS or Program execution
    Set Alert based on specific type of compliance violation for HIPAA, GLBA, PCI-DSS, SOX,FISMA, etc., based on failed logon attempts, policy changes, account changes, and audit logs cleared

Log Forensics

  • Drill down to raw logs events and do a root cause analysis within minutes, and drastically reduce the time-to-remediate
  • Generate network forensic reports like user activity reports, system audit reports,regulatory compliance reports, etc.
  • Pinpoint the exact log entry which caused the security activity in minutes

Internal Threat Monitoring

  • Analyzes security events and identifies unauthorized and failed logins, and rogue user(s) in real-time
  • Set alerts for suspicious hosts, and monitor events exclusively to find out who is responsible for them

Log Archive

  • Automatically archives all machine generated logs, system logs, device logs & application logs to a centralized repository
  • Encrypts the event log archive files to ensure the log data is secured for future forensic analysis, compliance and internal audits.

Clique aqui para obter maiores informações e solicitar a sua trial


Soluções para Gerenciamento de TI e Redes

Otimize o Gerenciamento de TI & Redes de forma completa, simples e acessível

As soluções da ManageEngine compreendem um conjunto de ferramentas para as mais diversas necessidades do Gerenciamento de TI e Redes de empresas de qualquer segmento e tamanho.

100% baseadas em interface web, de fácil instalação e administração, e com uma relação custo-benefício imbatível, as soluções da ManageEngine estão prontas para ajudar você a entregar mais para o seu negócio - hoje!



Rua Baceunas, 109
São Paulo-SP

Telefone: +55 11 2359-0440