Ratings and Reviews 0 Ratings
Ratings and Reviews 397 Ratings
What is LogSentinel?
LogSentinel aims to enhance the information security capabilities of organizations across various sectors by utilizing cutting-edge technologies like blockchain and artificial intelligence. Our comprehensive solutions are designed to safeguard against cyber threats while ensuring adherence to relevant laws and regulations.
At the forefront of our offerings is LogSentinel SIEM, a state-of-the-art Security Information and Event Management System that stands out for its ease of use, reliability, and innovative features. This system empowers organizations to effectively address their security vulnerabilities, significantly streamlining the processes of incident detection, investigation, and response while minimizing associated costs. With exceptional log integrity, unlimited data retention, and straightforward pricing models, LogSentinel delivers unmatched value. Its remarkable user-friendliness and adaptability make it an essential asset for small and medium-sized enterprises (SMEs) seeking to bolster their cybersecurity and compliance strategies, providing them with an enterprise-level security solution that is both manageable and financially accessible. Furthermore, LogSentinel's commitment to innovation ensures that clients remain ahead of emerging threats in the dynamic landscape of cybersecurity.
What is ManageEngine ADAudit Plus?
ADAudit Plus offers comprehensive insights into all activities within your Windows Server environment, ensuring both safety and compliance. This tool provides an organized perspective on modifications made to your Active Directory (AD) resources, encompassing AD objects, their attributes, group policies, and much more. By implementing AD auditing, you can identify and address insider threats, misuse of privileges, or other potential security breaches. It grants a thorough overview of all elements in AD, including users, computers, groups, organizational units, and group policy objects. You can monitor user management actions such as deletions, password resets, and changes in permissions, along with information detailing who performed these actions, what was done, when it happened, and where. To maintain a principle of least privilege, it's essential to track additions and removals from both security and distribution groups, enabling better oversight of user access rights. This ongoing vigilance not only helps in compliance but also fortifies the overall security posture of your server environment.
Integrations Supported
Active Directory
Amazon Web Services (AWS)
Azure Marketplace
Google Workspace
Microsoft 365
Microsoft Entra ID
Integrations Supported
Active Directory
Amazon Web Services (AWS)
Azure Marketplace
Google Workspace
Microsoft 365
Microsoft Entra ID
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$595.00/year
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
LogSentinel
Date Founded
2017
Company Location
Bulgaria
Company Website
logsentinel.com
Company Facts
Organization Name
Zoho
Date Founded
1996
Company Location
India
Company Website
www.manageengine.com/products/active-directory-audit/active-directory-auditing-solutions.html
Categories and Features
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
Categories and Features
Audit
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
HIPAA Compliance
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring