Ratings and Reviews 154 Ratings
Ratings and Reviews 0 Ratings
What is ManageEngine EventLog Analyzer?
Manage Engine's EventLog Analyzer stands out as the most cost-effective security information and event management (SIEM) software in the market. This secure, cloud-based platform encompasses vital SIEM functionalities such as log analysis, log consolidation, user activity surveillance, and file integrity monitoring. Additional features include event correlation, forensic analysis of logs, and retention of log data. With its robust capabilities, real-time alerts can be generated, enhancing security response. By utilizing Manage Engine's EventLog Analyzer, users can effectively thwart data breaches, uncover the underlying causes of security challenges, and counteract complex cyber threats while ensuring compliance and maintaining a secure operational environment.
What is Assuria ALM-FIM?
Maintain vigilant oversight of critical files, directories, and registry entries—especially those that typically do not undergo changes during standard operations—to detect any alterations that may signal possible threats. Ensure you catalog all installed software packages and implement automatic systems for monitoring, reporting, and alerting to capture any changes that occur. The package monitoring is conducted in accordance with policy templates, which facilitate specific reporting and notifications about notable modifications. ALM FIM has the capability to record both the former and current states of altered text files and registry entries, allowing for the identification and assessment of particular changes, as well as the option to revert them when needed. Furthermore, ALM-FIM systematically collects and stores metadata associated with files, folders, and registry keys, thereby providing extensive monitoring functionalities. The gathered metadata includes a variety of information such as checksums, sizes, permissions, modification timestamps, links, and other relevant data, ensuring a comprehensive view of your system's integrity. By adopting this proactive strategy, security is bolstered, and system stability is effectively preserved over time, creating a robust defense against potential vulnerabilities. Regular reviews of the monitoring data can also help in identifying long-term trends and patterns that may require further attention.
Integrations Supported
Kayako
ManageEngine ServiceDesk Plus
Zendesk
API Availability
Has API
API Availability
Has API
Pricing Information
$595
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
ManageEngine
Date Founded
1996
Company Location
United States
Company Website
www.manageengine.com/products/eventlog/log-management-tool.html
Company Facts
Organization Name
Assuria
Date Founded
2005
Company Location
United Kingdom
Company Website
assuria.com/products/alm-siem-2
Categories and Features
Incident Management
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Log Management
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Server Management
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring