Company Website

Ratings and Reviews 74 Ratings

Ratings and Reviews 2 Ratings

Total
ease
features
design
support

Media

Media

Integrations Supported

Microsoft Azure
Active Directory
Amazon Web Services (AWS)
Azure Marketplace
BloxOne Threat Defense
Bosch IoT Suite
Couchbase
F5 BIG-IP
Microsoft Entra ID
Microsoft Exchange
MongoDB
Oracle Berkeley DB
PostgreSQL
SAP HANA
SAP Store
Salesforce
Skype
VMware ESXi
Zammad
openITCOCKPIT

Integrations Supported

Microsoft Azure
Active Directory
Amazon Web Services (AWS)
Azure Marketplace
BloxOne Threat Defense
Bosch IoT Suite
Couchbase
F5 BIG-IP
Microsoft Entra ID
Microsoft Exchange
MongoDB
Oracle Berkeley DB
PostgreSQL
SAP HANA
SAP Store
Salesforce
Skype
VMware ESXi
Zammad
openITCOCKPIT

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$0/year
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Zoho

Date Founded

1996

Company Location

India

Company Website

www.manageengine.com/log-management/siem-solution-log360.html

Company Facts

Organization Name

Checkmk

Date Founded

2007

Company Location

Germany

Company Website

checkmk.com

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Security

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Categories and Features

Business Activity Monitoring

Alerts / Notifications
Business Process Management
Cross Application Analysis
Email Monitoring
Events Monitoring
KPI Monitoring
Pre-Configured Events
Reporting / Analytics
Workflow Management

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Database Monitoring

Anomaly Detection
Autodiscovery
Capacity Planning
Dashboard
Dependency Tracking
Historical Trend Analysis
Multitenancy
Notifications / Alerts
Performance Monitoring
Permissions / Access Controls
Predictive Analytics
Prioritization
Query Analysis
Resource Optimization
Troubleshooting

IT Alerting

Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications

IT Infrastructure Monitoring

Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring

Network Mapping

Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting

Network Monitoring

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting

Server Management

CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring

System Monitoring

Alerts / Notifications
Antivirus Management
Data Backup / Recovery
Device Monitoring
Inventory Management
Patch Management
Policy-based Automation
Remote Monitoring
Reporting / Analytics
Risk Analysis
Server Monitoring
Service Configuration Management

Website Monitoring

Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting

Popular Alternatives

Popular Alternatives

AdRem NetCrunch Reviews & Ratings

AdRem NetCrunch

AdRem Software
Sematext Cloud Reviews & Ratings

Sematext Cloud

Sematext Group